CVE-2023-2060
📋 TL;DR
This vulnerability allows remote attackers to bypass authentication on Mitsubishi Electric industrial control modules via FTP due to weak password requirements. Attackers can use dictionary attacks or password sniffing to gain unauthorized access. Affected systems include specific MELSEC iQ-R and iQ-F series EtherNet/IP modules.
💻 Affected Systems
- Mitsubishi Electric MELSEC iQ-R Series EtherNet/IP module RJ71EIP91
- Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP
📦 What is this software?
Fx5 Enet\/ip Firmware by Mitsubishielectric
Rj71eip91 Firmware by Mitsubishielectric
Sw1dnn Eipct Bd Firmware by Mitsubishielectric
Sw1dnn Eipctfx5 Bd Firmware by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of industrial control modules leading to unauthorized access, potential manipulation of industrial processes, data theft, or disruption of operations.
Likely Case
Unauthorized access to FTP services allowing attackers to read/write files, potentially leading to configuration changes, data exfiltration, or foothold for further attacks.
If Mitigated
Limited impact with proper network segmentation and strong authentication controls in place.
🎯 Exploit Status
Exploitation requires only standard FTP tools and weak password guessing or sniffing techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific firmware versions
Vendor Advisory: https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf
Restart Required: Yes
Instructions:
1. Download firmware update from Mitsubishi Electric support portal. 2. Follow vendor's firmware update procedure for affected modules. 3. Verify successful update and restart modules as required.
🔧 Temporary Workarounds
Disable FTP Service
allDisable FTP functionality if not required for operations
Configure via module web interface or programming software to disable FTP service
Network Segmentation
allRestrict network access to modules using firewalls or VLANs
Configure firewall rules to block FTP (port 21) access from untrusted networks
🧯 If You Can't Patch
- Implement strong password policies and multi-factor authentication if supported
- Monitor FTP access logs for brute force attempts and unauthorized access
🔍 How to Verify
Check if Vulnerable:
Check if affected modules are running vulnerable firmware versions and have FTP service enabled
Check Version:
Check module firmware version via web interface or programming software (specific commands vary by module)
Verify Fix Applied:
Verify firmware version is updated to patched version and test FTP authentication with strong passwords
📡 Detection & Monitoring
Log Indicators:
- Multiple failed FTP authentication attempts
- Successful FTP logins from unusual IP addresses
- FTP configuration changes
Network Indicators:
- FTP traffic to industrial control modules
- Brute force patterns on port 21
- Unusual file transfers via FTP
SIEM Query:
source="ftp_logs" (event_type="authentication_failure" count>10 within 5min) OR (event_type="authentication_success" from new_ip)