First published: Mon Nov 06 2023(Updated: )
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
All of | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4699 has a high severity due to the missing authentication for critical functions, allowing unauthorized access.
To fix CVE-2023-4699, apply the security updates released by Mitsubishi Electric for the affected MELSEC CPU modules.
CVE-2023-4699 affects several Mitsubishi Electric MELSEC CPU series, including MELSEC-F, MELSEC iQ-F, MELSEC iQ-R, and more.
Yes, CVE-2023-4699 can be exploited remotely due to the absence of proper authentication mechanisms.
As of now, it is recommended to apply patches rather than relying on workarounds for CVE-2023-4699.