#VU71793 Authentication Bypass by Spoofing


Published: 2023-02-03

Vulnerability identifier: #VU71793

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-40269

CWE-ID: CWE-290

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
GOT2000 GT27 model
Server applications / SCADA systems
GOT2000 GT25 model
Server applications / SCADA systems
GT SoftGOT2000
Server applications / SCADA systems

Vendor: Mitsubishi Electric

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote attacker can impersonate legitimate users by abusing inappropriate HTML attributes or cause users' browsers to disclose sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

GOT2000 GT27 model: 01.14.000 - 01.47.000

GOT2000 GT25 model: 01.14.000 - 01.47.000

GT SoftGOT2000: 1.265B - 1.285X


External links
http://jvn.jp/vu/JVNVU91222434/index.html
http://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-021_en.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability