cve/2023/CVE-2023-6374.md

18 lines
988 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6374)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC%20WS%20Series%20WS0-GETH00200&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20All%20serial%20numbers%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-294%20Authentication%20Bypass%20by%20Capture-replay&color=brighgreen)
### Description
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all serial numbers allows a remote unauthenticated attacker to bypass authentication by capture-replay attack and illegally login to the affected module. As a result, the remote attacker who has logged in illegally may be able to disclose or tamper with the programs and parameters in the modules.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds