CVE-2023-2060

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication on Mitsubishi Electric industrial control modules via FTP due to weak password requirements. Attackers can use dictionary attacks or password sniffing to gain unauthorized access. Affected systems include specific MELSEC iQ-R and iQ-F series EtherNet/IP modules.

💻 Affected Systems

Products:
  • Mitsubishi Electric MELSEC iQ-R Series EtherNet/IP module RJ71EIP91
  • Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP
Versions: All versions prior to firmware updates
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in FTP function implementation. Requires FTP service to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of industrial control modules leading to unauthorized access, potential manipulation of industrial processes, data theft, or disruption of operations.

🟠

Likely Case

Unauthorized access to FTP services allowing attackers to read/write files, potentially leading to configuration changes, data exfiltration, or foothold for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and strong authentication controls in place.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible if modules are exposed to internet.
🏢 Internal Only: MEDIUM - Still vulnerable to internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only standard FTP tools and weak password guessing or sniffing techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Mitsubishi Electric support portal. 2. Follow vendor's firmware update procedure for affected modules. 3. Verify successful update and restart modules as required.

🔧 Temporary Workarounds

Disable FTP Service

all

Disable FTP functionality if not required for operations

Configure via module web interface or programming software to disable FTP service

Network Segmentation

all

Restrict network access to modules using firewalls or VLANs

Configure firewall rules to block FTP (port 21) access from untrusted networks

🧯 If You Can't Patch

  • Implement strong password policies and multi-factor authentication if supported
  • Monitor FTP access logs for brute force attempts and unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check if affected modules are running vulnerable firmware versions and have FTP service enabled

Check Version:

Check module firmware version via web interface or programming software (specific commands vary by module)

Verify Fix Applied:

Verify firmware version is updated to patched version and test FTP authentication with strong passwords

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed FTP authentication attempts
  • Successful FTP logins from unusual IP addresses
  • FTP configuration changes

Network Indicators:

  • FTP traffic to industrial control modules
  • Brute force patterns on port 21
  • Unusual file transfers via FTP

SIEM Query:

source="ftp_logs" (event_type="authentication_failure" count>10 within 5min) OR (event_type="authentication_success" from new_ip)

🔗 References

📤 Share & Export