First published: Fri Jun 02 2023(Updated: )
Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Fx5-enet\/ip Firmware | ||
Mitsubishielectric Fx5-enet\/ip | ||
Mitsubishielectric Sw1dnn-eipct-bd Firmware | ||
Mitsubishielectric Sw1dnn-eipct-bd | ||
Mitsubishielectric Rj71eip91 Firmware | ||
Mitsubishielectric Rj71eip91 | ||
Mitsubishielectric Sw1dnn-eipctfx5-bd Firmware | ||
Mitsubishielectric Sw1dnn-eipctfx5-bd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2060 is a Weak Password Requirements vulnerability in the FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP.
CVE-2023-2060 allows a remote unauthenticated attacker to access the module via FTP by dictionary attack or password guessing.
The severity of CVE-2023-2060 is high, with a CVSS score of 7.5.
CVE-2023-2060 affects the MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP.
To fix the Weak Password Requirements vulnerability in the FTP function, it is recommended to update to the latest firmware version provided by Mitsubishi Electric Corporation.