First published: Thu Jul 04 2024(Updated: )
Improper Authentication vulnerability in the mobile monitoring feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: * Active Directory is used in the security setting. * “Automatic log in” option is enabled in the security setting. * The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. * The IcoAnyGlass IIS Application Pool account is included in GENESIS64TM and MC Works64 Security and has permission to log in.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
GENESIS64 AlarmWorX Multimedia | >=10.97<=10.97.2 | |
ICONICS GENESIS64 | >=10.97<=10.97.2 | |
Mitsubishi Electric MC-WORX Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1573 is classified as a high severity vulnerability due to its potential for remote unauthorized access.
To mitigate CVE-2024-1573, update to the latest versions of ICONICS GENESIS64 or Mitsubishi Electric GENESIS64 beyond 10.97.2.
CVE-2024-1573 affects ICONICS GENESIS64 and Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2, as well as all versions of Mitsubishi Electric MC Works64.
Yes, CVE-2024-1573 can be exploited by remote unauthenticated attackers, allowing them to bypass authentication controls.
Organizations should assess their systems for this vulnerability and apply the appropriate updates to secure their applications.