Authentication Bypass by Capture-replay in Mitsubishi Electric MELSEC-F Series



Published: 2023-06-30
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2023-2846
CWE-ID CWE-294
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
MELSEC-F FX3U
Hardware solutions / Firmware

MELSEC-F ​FX3U-32MR/UA1
Hardware solutions / Firmware

MELSEC-F FX3U-64MR/UA1
Hardware solutions / Firmware

​MELSEC-F FX3U-32MS/ES
Hardware solutions / Firmware

MELSEC-F FX3U-64MS/ES
Hardware solutions / Firmware

​MELSEC-F FX3U-xMy/ES-A
Hardware solutions / Firmware

MELSEC-F ​FX3UC
Hardware solutions / Firmware

MELSEC-F ​FX3UC-16MR/D-T
Hardware solutions / Firmware

MELSEC-F FX3UC-16MR/DS-T ​MELSEC-F FX3UC-32MT-LT
Hardware solutions / Firmware

MELSEC-F FX3UC-32MT-LT-2 MELSEC-F ​FX3UC-16MT/D-P4
Hardware solutions / Firmware

MELSEC-F FX3UC-16MR/DSS-P4​
Hardware solutions / Firmware

MELSEC-F FX3G-xMy/ES-A
Hardware solutions / Firmware

MELSEC-F ​FX3GC-32MT/D
Hardware solutions / Firmware

MELSEC-F FX3GC-32MT/DSS
Hardware solutions / Firmware

​MELSEC-F FX3GE
Hardware solutions / Firmware

MELSEC-F ​FX3GA
Hardware solutions / Firmware

​MELSEC-F FX3S
Hardware solutions / Firmware

MELSEC-F ​FX3S-30My/z-2AD
Hardware solutions / Firmware

MELSEC-F ​FX3SA-xMy-CM
Hardware solutions / Firmware

Vendor Mitsubishi Electric

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Authentication Bypass by Capture-replay

EUVDB-ID: #VU77828

Risk: Medium

CVSSv3.1: 6.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2023-2846

CWE-ID: CWE-294 - Authentication Bypass by Capture-replay

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to authentication bypass by capture-replay. A remote attacker can bypass authentication process and gain unauthorized access to the application.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

MELSEC-F FX3U: All versions

MELSEC-F ​FX3U-32MR/UA1: All versions

MELSEC-F FX3U-64MR/UA1: All versions

​MELSEC-F FX3U-32MS/ES: All versions

MELSEC-F FX3U-64MS/ES: All versions

​MELSEC-F FX3U-xMy/ES-A: All versions

MELSEC-F ​FX3UC: All versions

MELSEC-F ​FX3UC-16MR/D-T: All versions

MELSEC-F FX3UC-16MR/DS-T ​MELSEC-F FX3UC-32MT-LT: All versions

MELSEC-F FX3UC-32MT-LT-2 MELSEC-F ​FX3UC-16MT/D-P4: All versions

MELSEC-F FX3UC-16MR/DSS-P4​: All versions

MELSEC-F FX3G-xMy/ES-A: All versions

MELSEC-F ​FX3GC-32MT/D: All versions

MELSEC-F FX3GC-32MT/DSS: All versions

​MELSEC-F FX3GE: All versions

MELSEC-F ​FX3GA: All versions

​MELSEC-F FX3S: All versions

MELSEC-F ​FX3S-30My/z-2AD: All versions

MELSEC-F ​FX3SA-xMy-CM: All versions

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-180-04
http://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-005_en.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###