CWE
330 342
Advisory Published
Updated

CVE-2023-3373

First published: Fri Aug 04 2023(Updated: )

Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it.

Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp

Affected SoftwareAffected VersionHow to fix
Mitsubishielectric Gt21 Firmware<01.50.000
Mitsubishielectric Gt21
Mitsubishielectric Gs21 Firmware<01.50.000
Mitsubishielectric Gs21
Mitsubishi Electric ​GOT2000 Series, GT21 model: versions 01.49.000 and prior
Mitsubishi Electric ​GOT SIMPLE, GS21 model: versions 01.49.000 and prior

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the CVE ID for this vulnerability?

    The CVE ID for this vulnerability is CVE-2023-3373.

  • What is the severity rating of CVE-2023-3373?

    The severity rating of CVE-2023-3373 is critical with a score of 9.1.

  • Which software versions are affected by CVE-2023-3373?

    Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior, and GOT SIMPLE Series GS21 model versions 01.49.000 and prior are affected by CVE-2023-3373.

  • How can an attacker exploit CVE-2023-3373?

    An attacker can exploit CVE-2023-3373 to hijack data connections (session hijacking) remotely.

  • Where can I find more information about CVE-2023-3373?

    You can find more information about CVE-2023-3373 at the following references: [CISA Advisory](https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01), [Mitsubishi Electric PSIRT](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf), [JVN](https://jvn.jp/vu/JVNVU92167394/index.html).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203