First published: Fri Apr 14 2023(Updated: )
Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are "16" allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Gc-enet-com Firmware | ||
Mitsubishielectric Gc-enet-com | ||
Mitsubishi Electric India GC-ENET-COM: Models with the beginning serial number 16XXXXXXXXX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM is CVE-2023-1285.
The severity of CVE-2023-1285 is high with a severity score of 5.9.
The affected software by CVE-2023-1285 is the Mitsubishi Electric India GC-ENET-COM firmware.
The Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted requests.
Yes, there are references available for CVE-2023-1285. You can find them at the following links: [link1](https://mitsubishielectric.in/fa/cnc-pdf/DoS_in_Ethernet_Communication_Extension_Unit_GC_ENET_COM_of_GOC35_Series.pdf), [link2](https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-15).