CVE-2023-4088
📋 TL;DR
This vulnerability allows a local attacker to execute malicious code on Mitsubishi Electric FA engineering software when installed in non-default folders, due to incorrect default permissions. It affects multiple industrial control system software products, potentially leading to information disclosure, data tampering/deletion, or denial-of-service conditions.
💻 Affected Systems
- MELSOFT series (multiple FA engineering software products)
- GT Designer3
- GX Works3
- MX Component
- MX OPC Server DA/UA
- Easysocket
📦 What is this software?
Gx Works3 by Mitsubishielectric
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary code, steal sensitive industrial data, disrupt manufacturing processes, or cause physical damage to equipment.
Likely Case
Local privilege escalation leading to unauthorized access to engineering data, configuration tampering, or service disruption affecting production systems.
If Mitigated
Limited impact if proper access controls, network segmentation, and least privilege principles are implemented, restricting local access to authorized personnel only.
🎯 Exploit Status
Requires local access to the system. Exploitation is straightforward once an attacker gains local access to a system with vulnerable software installed in non-default location.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific product versions
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-010_en.pdf
Restart Required: Yes
Instructions:
1. Review vendor advisory for affected products. 2. Download and install updated versions from Mitsubishi Electric support portal. 3. Restart affected systems after installation. 4. Verify installation in default folder only.
🔧 Temporary Workarounds
Reinstall in default location
windowsUninstall software from non-default folder and reinstall in default installation folder
Uninstall via Control Panel > Programs and Features
Reinstall using default installation path
Restrict folder permissions
windowsApply strict access controls to installation folders to prevent unauthorized modifications
icacls "C:\Program Files\Mitsubishi\" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"
icacls "C:\Program Files (x86)\Mitsubishi\" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"
🧯 If You Can't Patch
- Ensure all installations use default folder paths only
- Implement strict access controls and network segmentation to limit local access to critical systems
🔍 How to Verify
Check if Vulnerable:
Check installation path of Mitsubishi FA software - if installed in non-default folder (not under Program Files or Program Files (x86)), system is vulnerable.
Check Version:
Check software version through Control Panel > Programs and Features or software's About dialog
Verify Fix Applied:
Verify software is installed in default folder and check version matches patched version from vendor advisory.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to Mitsubishi software folders
- Process creation from non-standard locations for Mitsubishi executables
- Permission changes to installation directories
Network Indicators:
- Unusual network traffic from engineering workstations to control systems
- Unexpected connections to OPC servers or engineering interfaces
SIEM Query:
Process Creation where (ImagePath contains "Mitsubishi" OR ImagePath contains "MELSOFT") AND NOT (ImagePath contains "Program Files" OR ImagePath contains "Program Files (x86)")
🔗 References
- https://jvn.jp/vu/JVNVU96447193/index.html
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-03
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-010_en.pdf
- https://jvn.jp/vu/JVNVU96447193/index.html
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-03
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-010_en.pdf