First published: Mon Oct 28 2019(Updated: )
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Undocumented hard-coded user passwords for root, ineaadmin, mitsadmin, and maint could allow an attacker to gain unauthorised access to the RTU. (Also, the accounts ineaadmin and mitsadmin are able to escalate privileges to root without supplying a password due to insecure entries in /etc/sudoers on the RTU.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Smartrtu Firmware | <=2.02 | |
Mitsubishielectric Smartrtu | ||
Inea Me-rtu Firmware | <=3.0 | |
INEA ME-RTU | ||
All of | ||
Mitsubishielectric Smartrtu Firmware | <=2.02 | |
Mitsubishielectric Smartrtu | ||
All of | ||
INEA ME-RTU | ||
Inea Me-rtu Firmware | <=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-14930.
The severity of CVE-2019-14930 is critical with a CVSS score of 9.8.
Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0 are affected by CVE-2019-14930.
The undocumented hard-coded user passwords for root, ineaadmin, mitsadmin, and maint could allow an attacker to gain unauthorized access to the RTU.
To fix CVE-2019-14930, it is recommended to update to the latest firmware version provided by Mitsubishi Electric or INEA.