First published: Fri May 19 2023(Updated: )
Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Melsec Ws0-geth00200 Firmware | ||
Mitsubishielectric Melsec Ws0-geth00200 | ||
Mitsubishi Electric WS0-GETH00200: Serial numbers 2310**** and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1618 is high, with a severity value of 8.6.
CVE-2023-1618 allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet, which is a hidden function.
Yes, Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 firmware is affected by CVE-2023-1618.
An attacker can exploit CVE-2023-1618 by connecting to the affected module via telnet, bypassing authentication and illegally logging in.
Yes, Mitsubishi Electric Corporation has provided a fix for CVE-2023-1618. Please refer to the vendor's advisory for more information.