Vulnerability Details : CVE-2023-6374
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all serial numbers allows a remote unauthenticated attacker to bypass authentication by capture-replay attack and illegally login to the affected module. As a result, the remote attacker who has logged in illegally may be able to disclose or tamper with the programs and parameters in the modules.
Products affected by CVE-2023-6374
- cpe:2.3:o:mitsubishielectric:melsec_ws0-geth00200_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6374
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 63 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6374
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
2.2
|
3.6
|
Mitsubishi Electric Corporation | 2024-01-30 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST | 2024-02-06 |
CWE ids for CVE-2023-6374
-
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).Assigned by: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp (Primary)
References for CVE-2023-6374
-
https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-03
Mitsubishi Electric MELSEC WS Series Ethernet Interface Module | CISAThird Party Advisory;US Government Resource
-
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-019_en.pdf
Vendor Advisory
-
https://jvn.jp/vu/JVNVU99497477
JVNVU#99497477: 三菱電機製MELSEC WSシリーズEthernetインタフェースユニットにおけるCapture-replayによる認証回避の脆弱性Third Party Advisory
Jump to