Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4699: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC-F Series FX3U-16MT/ES

0
Critical
VulnerabilityCVE-2023-4699cvecve-2023-4699cwe-306
Published: Mon Nov 06 2023 (11/06/2023, 05:02:15 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC-F Series FX3U-16MT/ES

Description

CVE-2023-4699 is a critical vulnerability affecting multiple Mitsubishi Electric MELSEC series CPU modules and CNC systems. It involves missing authentication for critical functions, allowing remote unauthenticated attackers to send specially crafted packets to execute arbitrary commands. This can lead to unauthorized disclosure or tampering of control programs and potentially cause denial-of-service by resetting devices to factory settings. The vulnerability affects all versions of the listed products and has a CVSS score of 10. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability. No known exploits are currently reported in the wild. European industrial environments using these Mitsubishi Electric products are at significant risk, especially in manufacturing and critical infrastructure sectors. Immediate mitigation involves network segmentation, strict access controls, and monitoring for anomalous traffic targeting these devices.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:34:17 UTC

Technical Analysis

CVE-2023-4699 is a critical security vulnerability classified under CWE-306 (Missing Authentication for Critical Function) impacting a broad range of Mitsubishi Electric Corporation's industrial control products, including MELSEC-F Series FX3U-16MT/ES, MELSEC iQ-F, iQ-R, iQ-L, Q, and L series CPU modules, as well as multiple CNC series (M800V/M80V, M800/M80/E80, M700V/M70V/E70). The core issue is the absence of authentication mechanisms for critical functions within these devices, enabling a remote attacker to send specially crafted packets without any prior authentication or user interaction. This allows the attacker to execute arbitrary commands remotely, which can result in unauthorized reading or modification of control programs, potentially disrupting industrial processes or leaking sensitive operational data. Additionally, attackers can induce a denial-of-service condition by resetting the device memory to factory defaults or rebooting the systems remotely, severely impacting operational continuity. The vulnerability affects all versions of the specified products, indicating a systemic design flaw. The CVSS v3.1 base score is 10.0, reflecting the highest severity due to network attack vector (AV:N), no required privileges (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the critical nature and ease of exploitation make this a high-risk threat for industrial environments relying on these Mitsubishi Electric products.

Potential Impact

For European organizations, particularly those in manufacturing, energy, transportation, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation can lead to unauthorized access and manipulation of industrial control systems, causing operational disruptions, safety hazards, and potential physical damage. The ability to reset devices to factory settings remotely can result in prolonged downtime and loss of control over critical processes. Confidentiality breaches may expose proprietary control logic or operational data, undermining competitive advantage and compliance with data protection regulations such as GDPR. The lack of authentication means attackers can exploit this vulnerability from anywhere on the network, increasing the attack surface, especially in environments with remote access or insufficient network segmentation. The potential for cascading failures in interconnected industrial systems could have wide-reaching consequences, including supply chain disruptions and safety incidents.

Mitigation Recommendations

1. Immediately implement strict network segmentation to isolate affected Mitsubishi Electric devices from general IT networks and limit access to trusted control networks only. 2. Deploy robust firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized packets targeting these devices. 3. Restrict remote access to these control systems using VPNs with multi-factor authentication and limit access to essential personnel only. 4. Regularly audit and monitor network traffic for anomalous patterns indicative of exploitation attempts, such as unexpected command packets or resets. 5. Engage with Mitsubishi Electric support channels to obtain any available patches or firmware updates as soon as they are released. 6. Where patching is not immediately possible, consider deploying compensating controls such as application-layer gateways or protocol-aware proxies that enforce authentication. 7. Conduct thorough risk assessments and update incident response plans to include scenarios involving industrial control system compromise. 8. Train operational technology (OT) staff on the nature of this vulnerability and best practices for securing industrial networks. 9. Maintain an inventory of all affected devices and prioritize remediation based on criticality and exposure. 10. Collaborate with industry information sharing groups to stay informed about emerging threats and mitigation strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2023-09-01T05:21:41.572Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941947f9050fe8508061322

Added to database: 12/16/2025, 5:18:55 PM

Last enriched: 12/23/2025, 6:34:17 PM

Last updated: 2/5/2026, 11:55:40 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats