8 results (0.016 seconds)

CVSS: 10.0EPSS: 0%CPEs: 432EXPL: 0

Insufficient Verification of Data Authenticity vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules and MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to reset the memory of the products to factory default state and cause denial-of-service (DoS) condition on the products by sending specific packets. Vulnerabilidad de verificación insuficiente de autenticidad de datos en los módulos principales Mitsubishi Electric Corporation MELSEC-F Series y en los módulos de MELSEC iQ-F Series CPU permite a un atacante remoto no autenticado restablecer la memoria de los productos al estado predeterminado de fábrica y provocar Denegación de Servicio (DoS) condición de los productos mediante el envío de paquetes específicos. Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely. • https://jvn.jp/vu/JVNVU94620134 https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-03 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-013_en.pdf • CWE-306: Missing Authentication for Critical Function CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 9.1EPSS: 0%CPEs: 380EXPL: 0

Improper Authentication vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules allows a remote unauthenticated attacker to obtain sequence programs from the product or write malicious sequence programs or improper data in the product without authentication by sending illegitimate messages. Vulnerabilidad de autenticación incorrecta en los módulos principales de la serie MELSEC-F de Mitsubishi Electric Corporation permite que un atacante remoto no autenticado obtenga programas de secuencia del producto o escriba programas de secuencia maliciosos o datos inadecuados en el producto sin autenticación mediante el envío de mensajes ilegítimos. • https://jvn.jp/vu/JVNVU90509290 https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-13 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-012_en.pdf • CWE-287: Improper Authentication •

CVSS: 9.1EPSS: 0%CPEs: 300EXPL: 0

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets. • https://jvn.jp/vu/JVNVU94519952 https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-04 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-005_en.pdf • CWE-294: Authentication Bypass by Capture-replay •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Improper initialization vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.16 and prior, FX3U-ENET-L Firmware version 1.16 and prior and FX3U-ENET-P502 Firmware version 1.16 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product by sending specially crafted packets. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery. Una vulnerabilidad de inicialización inapropiada en FX3U-ENET serie MELSEC-F, versiones de Firmware 1.16 y anteriores, FX3U-ENET-L versiones de Firmware 1.16 y anteriores, y FX3U-ENET-P502 versiones de Firmware 1.16 y anteriores, permite a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en la función de comunicación del producto mediante el envío de paquetes especialmente diseñados. El control por parte del PLC de la serie MELSEC-F no está afectado por esta vulnerabilidad, pero es necesario reiniciar el sistema para recuperarlo • https://jvn.jp/vu/JVNVU93268332/index.html https://www.cisa.gov/uscert/ics/advisories/icsa-22-013-07 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-024_en.pdf • CWE-665: Improper Initialization •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

Lack of administrator control over security vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.14 and prior, FX3U-ENET-L Firmware version 1.14 and prior and FX3U-ENET-P502 Firmware version 1.14 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product or other unspecified effects by sending specially crafted packets to an unnecessary opening of TCP port. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery. Una falta de control del administrador sobre la vulnerabilidad de seguridad en la serie MELSEC-F FX3U-ENET Firmware versión 1.14 y anteriores, FX3U-ENET-L Firmware versión 1.14 y anteriores y FX3U-ENET-P502 Firmware versión 1.14 y anteriores permite que un atacante remoto no autenticado cause una condición de denegación de servicio (DoS) en la función de comunicación del producto u otros efectos no especificados mediante el envío de paquetes especialmente diseñados a una apertura no necesaria del puerto TCP. El control por parte del PLC de la serie MELSEC-F no está afectado por esta vulnerabilidad, pero es necesario reiniciar el sistema para recuperarlo • https://jvn.jp/vu/JVNVU93268332/index.html https://www.cisa.gov/uscert/ics/advisories/icsa-22-013-01 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-023_en.pdf •