First published: Fri Jun 02 2023(Updated: )
Use of Hard-coded Password vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to obtain a hard-coded password and access to the module via FTP.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Fx5-enet\/ip Firmware | ||
Mitsubishielectric Fx5-enet\/ip | ||
Mitsubishielectric Sw1dnn-eipct-bd Firmware | ||
Mitsubishielectric Sw1dnn-eipct-bd | ||
Mitsubishielectric Rj71eip91 Firmware | ||
Mitsubishielectric Rj71eip91 | ||
Mitsubishielectric Sw1dnn-eipctfx5-bd Firmware | ||
Mitsubishielectric Sw1dnn-eipctfx5-bd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2061 is a vulnerability in the FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP.
CVE-2023-2061 allows a remote unauthenticated attacker to obtain a hard-coded password and access the module via FTP on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP.
CVE-2023-2061 has a severity score of 7.5 (high).
To fix CVE-2023-2061, it is recommended to update the firmware of Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP.
More information about CVE-2023-2061 can be found on the Mitsubishi Electric Corporation PSIRT website and the Japan Vulnerability Notes (JVN) website.