Логотип exploitDog
bind:CVE-2023-1618
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-1618

Количество 3

Количество 3

nvd логотип

CVE-2023-1618

больше 2 лет назад

Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-37vx-v53j-77pr

больше 2 лет назад

Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all versions allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-02735

больше 2 лет назад

Уязвимость модуля связи для контроллера безопасности Mitsubishi Electric WS0-GETH00200, связанная с отсутствием аутентификации, позволяющая нарушителю повысить свои привилегии и получит доступ к устройству

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-1618

Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-37vx-v53j-77pr

Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all versions allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-02735

Уязвимость модуля связи для контроллера безопасности Mitsubishi Electric WS0-GETH00200, связанная с отсутствием аутентификации, позволяющая нарушителю повысить свои привилегии и получит доступ к устройству

CVSS3: 7.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу