First published: Mon Nov 06 2023(Updated: )
Improper Restriction of Excessive Authentication Attempts vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F/iQ-R Series CPU modules Web server function allows a remote unauthenticated attacker to prevent legitimate users from logging into the Web server function for a certain period after the attacker has attempted to log in illegally by continuously attempting unauthorized login to the Web server function. The impact of this vulnerability will persist while the attacker continues to attempt unauthorized login.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4625 has a high severity rating due to its potential to allow remote unauthenticated attackers to disrupt legitimate access to the Mitsubishi MELSEC iQ-F/iQ-R Series CPUs' web server.
To fix CVE-2023-4625, apply the latest firmware update from Mitsubishi Electric that addresses this vulnerability.
CVE-2023-4625 affects Mitsubishi Electric MELSEC iQ-F/iQ-R Series CPU modules with specific firmware versions.
CVE-2023-4625 allows a remote unauthenticated attacker to execute excessive authentication attempts, potentially locking out legitimate users.
Using devices affected by CVE-2023-4625 without the necessary patch increases the risk of unauthorized access and operational disruption.