CVE-2023-6942
📋 TL;DR
This vulnerability allows remote unauthenticated attackers to bypass authentication in multiple Mitsubishi Electric industrial software products by sending specially crafted packets. Affected systems include EZSocket, GT Designer3, GX Works2/3, MELSOFT Navigator, MT Works2, MX Component, and MX OPC Server DA/UA. Attackers can connect to these products illegally without valid credentials.
💻 Affected Systems
- EZSocket
- GT Designer3 Version1(GOT1000)
- GT Designer3 Version1(GOT2000)
- GX Works2
- GX Works3
- MELSOFT Navigator
- MT Works2
- MX Component
- MX OPC Server DA/UA
📦 What is this software?
Ezsocket by Mitsubishielectric
Fr Configurator2 by Mitsubishielectric
Got1000 by Mitsubishielectric
Got2000 by Mitsubishielectric
Gx Works2 by Mitsubishielectric
Gx Works3 by Mitsubishielectric
Mc Works64 by Mitsubishielectric
Melsoft Navigator by Mitsubishielectric
Mt Works2 by Mitsubishielectric
Mx Component by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of industrial control systems, unauthorized access to critical automation functions, potential manipulation of industrial processes, and disruption of manufacturing operations.
Likely Case
Unauthorized access to engineering workstations, theft of intellectual property, configuration tampering, and potential disruption of industrial operations.
If Mitigated
Limited impact with proper network segmentation, but still exposes systems to reconnaissance and potential lateral movement.
🎯 Exploit Status
The vulnerability requires sending specially crafted packets but does not require authentication. The specific packet format is not publicly documented in the advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Varies by product - see vendor advisory for specific fixed versions
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-020_en.pdf
Restart Required: Yes
Instructions:
1. Review the vendor advisory for specific fixed versions for each product. 2. Download and install the latest versions from Mitsubishi Electric's official website. 3. Restart affected systems after installation. 4. Verify the update was successful by checking version numbers.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected systems in separate network segments with strict firewall rules to prevent unauthorized access.
Access Control Lists
allImplement strict network access controls to limit connections to trusted IP addresses only.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected systems from untrusted networks
- Deploy intrusion detection systems to monitor for authentication bypass attempts
🔍 How to Verify
Check if Vulnerable:
Check installed software versions against the affected version ranges listed in the vendor advisory.
Check Version:
Check version through each product's 'About' or 'Help' menu, or via Windows Programs and Features control panel.
Verify Fix Applied:
Verify that software versions have been updated to versions beyond those listed in the affected ranges.
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts followed by successful connections
- Unusual connection patterns to affected software ports
- Connections from unexpected IP addresses
Network Indicators:
- Unusual traffic patterns to ports used by affected Mitsubishi software
- Authentication bypass attempts detected via packet inspection
SIEM Query:
source_ip NOT IN (trusted_ips) AND dest_port IN (affected_software_ports) AND auth_result='success'
🔗 References
- https://jvn.jp/vu/JVNVU95103362
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-02
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-020_en.pdf
- https://jvn.jp/vu/JVNVU95103362
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-02
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-020_en.pdf