First published: Thu Nov 30 2023(Updated: )
Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Gx Works3 | ||
Mitsubishielectric Melsoft Iq Appportal | ||
Mitsubishielectric Melsoft Navigator | ||
Mitsubishielectric Motion Control Setting |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5247 is a vulnerability that allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file in multiple Mitsubishi Electric FA Engineering Software Products.
CVE-2023-5247 affects multiple Mitsubishi Electric FA Engineering Software Products, including Gx Works3, Melsoft Iq Appportal, Melsoft Navigator, and Motion Control Setting.
CVE-2023-5247 has a severity rating of 7.8, which is classified as high.
Yes, Mitsubishi Electric has released patches to address the CVE-2023-5247 vulnerability. Please refer to their official website or security advisories for more information.
You can find more information about CVE-2023-5247 on the official Mitsubishi Electric PSIRT website and the JVN database.