Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.
The product is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information.
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
Link | Tags |
---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf | vendor advisory |
https://jvn.jp/vu/JVNVU96063959 | third party advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02 | mitigation third party advisory us government resource |