CVE-2023-4699: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC-F Series FX3U-16MT/ES
CVE-2023-4699 is a critical vulnerability affecting multiple Mitsubishi Electric MELSEC series CPU modules and CNC systems. It involves missing authentication for critical functions, allowing remote unauthenticated attackers to send specially crafted packets to execute arbitrary commands. This can lead to unauthorized disclosure or tampering of control programs and potentially cause denial-of-service by resetting devices to factory settings. The vulnerability affects all versions of the listed products and has a CVSS score of 10. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability. No known exploits are currently reported in the wild. European industrial environments using these Mitsubishi Electric products are at significant risk, especially in manufacturing and critical infrastructure sectors. Immediate mitigation involves network segmentation, strict access controls, and monitoring for anomalous traffic targeting these devices.
AI Analysis
Technical Summary
CVE-2023-4699 is a critical security vulnerability classified under CWE-306 (Missing Authentication for Critical Function) impacting a broad range of Mitsubishi Electric Corporation's industrial control products, including MELSEC-F Series FX3U-16MT/ES, MELSEC iQ-F, iQ-R, iQ-L, Q, and L series CPU modules, as well as multiple CNC series (M800V/M80V, M800/M80/E80, M700V/M70V/E70). The core issue is the absence of authentication mechanisms for critical functions within these devices, enabling a remote attacker to send specially crafted packets without any prior authentication or user interaction. This allows the attacker to execute arbitrary commands remotely, which can result in unauthorized reading or modification of control programs, potentially disrupting industrial processes or leaking sensitive operational data. Additionally, attackers can induce a denial-of-service condition by resetting the device memory to factory defaults or rebooting the systems remotely, severely impacting operational continuity. The vulnerability affects all versions of the specified products, indicating a systemic design flaw. The CVSS v3.1 base score is 10.0, reflecting the highest severity due to network attack vector (AV:N), no required privileges (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the critical nature and ease of exploitation make this a high-risk threat for industrial environments relying on these Mitsubishi Electric products.
Potential Impact
For European organizations, particularly those in manufacturing, energy, transportation, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation can lead to unauthorized access and manipulation of industrial control systems, causing operational disruptions, safety hazards, and potential physical damage. The ability to reset devices to factory settings remotely can result in prolonged downtime and loss of control over critical processes. Confidentiality breaches may expose proprietary control logic or operational data, undermining competitive advantage and compliance with data protection regulations such as GDPR. The lack of authentication means attackers can exploit this vulnerability from anywhere on the network, increasing the attack surface, especially in environments with remote access or insufficient network segmentation. The potential for cascading failures in interconnected industrial systems could have wide-reaching consequences, including supply chain disruptions and safety incidents.
Mitigation Recommendations
1. Immediately implement strict network segmentation to isolate affected Mitsubishi Electric devices from general IT networks and limit access to trusted control networks only. 2. Deploy robust firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized packets targeting these devices. 3. Restrict remote access to these control systems using VPNs with multi-factor authentication and limit access to essential personnel only. 4. Regularly audit and monitor network traffic for anomalous patterns indicative of exploitation attempts, such as unexpected command packets or resets. 5. Engage with Mitsubishi Electric support channels to obtain any available patches or firmware updates as soon as they are released. 6. Where patching is not immediately possible, consider deploying compensating controls such as application-layer gateways or protocol-aware proxies that enforce authentication. 7. Conduct thorough risk assessments and update incident response plans to include scenarios involving industrial control system compromise. 8. Train operational technology (OT) staff on the nature of this vulnerability and best practices for securing industrial networks. 9. Maintain an inventory of all affected devices and prioritize remediation based on criticality and exposure. 10. Collaborate with industry information sharing groups to stay informed about emerging threats and mitigation strategies.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Czech Republic
CVE-2023-4699: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC-F Series FX3U-16MT/ES
Description
CVE-2023-4699 is a critical vulnerability affecting multiple Mitsubishi Electric MELSEC series CPU modules and CNC systems. It involves missing authentication for critical functions, allowing remote unauthenticated attackers to send specially crafted packets to execute arbitrary commands. This can lead to unauthorized disclosure or tampering of control programs and potentially cause denial-of-service by resetting devices to factory settings. The vulnerability affects all versions of the listed products and has a CVSS score of 10. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability. No known exploits are currently reported in the wild. European industrial environments using these Mitsubishi Electric products are at significant risk, especially in manufacturing and critical infrastructure sectors. Immediate mitigation involves network segmentation, strict access controls, and monitoring for anomalous traffic targeting these devices.
AI-Powered Analysis
Technical Analysis
CVE-2023-4699 is a critical security vulnerability classified under CWE-306 (Missing Authentication for Critical Function) impacting a broad range of Mitsubishi Electric Corporation's industrial control products, including MELSEC-F Series FX3U-16MT/ES, MELSEC iQ-F, iQ-R, iQ-L, Q, and L series CPU modules, as well as multiple CNC series (M800V/M80V, M800/M80/E80, M700V/M70V/E70). The core issue is the absence of authentication mechanisms for critical functions within these devices, enabling a remote attacker to send specially crafted packets without any prior authentication or user interaction. This allows the attacker to execute arbitrary commands remotely, which can result in unauthorized reading or modification of control programs, potentially disrupting industrial processes or leaking sensitive operational data. Additionally, attackers can induce a denial-of-service condition by resetting the device memory to factory defaults or rebooting the systems remotely, severely impacting operational continuity. The vulnerability affects all versions of the specified products, indicating a systemic design flaw. The CVSS v3.1 base score is 10.0, reflecting the highest severity due to network attack vector (AV:N), no required privileges (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the critical nature and ease of exploitation make this a high-risk threat for industrial environments relying on these Mitsubishi Electric products.
Potential Impact
For European organizations, particularly those in manufacturing, energy, transportation, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation can lead to unauthorized access and manipulation of industrial control systems, causing operational disruptions, safety hazards, and potential physical damage. The ability to reset devices to factory settings remotely can result in prolonged downtime and loss of control over critical processes. Confidentiality breaches may expose proprietary control logic or operational data, undermining competitive advantage and compliance with data protection regulations such as GDPR. The lack of authentication means attackers can exploit this vulnerability from anywhere on the network, increasing the attack surface, especially in environments with remote access or insufficient network segmentation. The potential for cascading failures in interconnected industrial systems could have wide-reaching consequences, including supply chain disruptions and safety incidents.
Mitigation Recommendations
1. Immediately implement strict network segmentation to isolate affected Mitsubishi Electric devices from general IT networks and limit access to trusted control networks only. 2. Deploy robust firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized packets targeting these devices. 3. Restrict remote access to these control systems using VPNs with multi-factor authentication and limit access to essential personnel only. 4. Regularly audit and monitor network traffic for anomalous patterns indicative of exploitation attempts, such as unexpected command packets or resets. 5. Engage with Mitsubishi Electric support channels to obtain any available patches or firmware updates as soon as they are released. 6. Where patching is not immediately possible, consider deploying compensating controls such as application-layer gateways or protocol-aware proxies that enforce authentication. 7. Conduct thorough risk assessments and update incident response plans to include scenarios involving industrial control system compromise. 8. Train operational technology (OT) staff on the nature of this vulnerability and best practices for securing industrial networks. 9. Maintain an inventory of all affected devices and prioritize remediation based on criticality and exposure. 10. Collaborate with industry information sharing groups to stay informed about emerging threats and mitigation strategies.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2023-09-01T05:21:41.572Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6941947f9050fe8508061322
Added to database: 12/16/2025, 5:18:55 PM
Last enriched: 12/23/2025, 6:34:17 PM
Last updated: 2/5/2026, 11:55:40 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23797: CWE-256 Plaintext Storage of a Password in OpenSolution Quick.Cart
MediumCVE-2026-23796: CWE-384 Session Fixation in OpenSolution Quick.Cart
MediumCritical N8n Sandbox Escape Could Lead to Server Compromise
CriticalCyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries
CriticalCVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.