Skip to main content

CVE-2023-6374: CWE-294 Authentication Bypass by Capture-replay in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200

Medium
VulnerabilityCVE-2023-6374cvecve-2023-6374cwe-294
Published: Tue Jan 30 2024 (01/30/2024, 09:00:14 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC WS Series WS0-GETH00200

Description

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all serial numbers allows a remote unauthenticated attacker to bypass authentication by capture-replay attack and illegally login to the affected module. As a result, the remote attacker who has logged in illegally may be able to disclose or tamper with the programs and parameters in the modules.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:32:57 UTC

Technical Analysis

CVE-2023-6374 is an authentication bypass vulnerability affecting the Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 modules. This vulnerability arises from a capture-replay attack vector, where an unauthenticated remote attacker can intercept and replay authentication data to bypass the authentication mechanism of the device. The affected product includes all serial numbers of the WS0-GETH00200 module, indicating a design or implementation flaw that is not limited to specific versions or firmware revisions. The vulnerability is classified under CWE-294, which pertains to improper authentication. Successful exploitation allows the attacker to gain unauthorized access to the module, enabling them to disclose or tamper with the programs and parameters stored within. This could lead to unauthorized control or manipulation of industrial control processes managed by these modules. The CVSS v3.1 base score is 5.9, reflecting a medium severity level. The vector string (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) indicates that the attack is network-based, requires high attack complexity, no privileges or user interaction, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on compensating controls until a vendor fix is released.

Potential Impact

For European organizations, especially those operating in critical infrastructure sectors such as manufacturing, energy, and utilities, this vulnerability poses a significant risk. The MELSEC WS Series modules are used in industrial automation and control systems (IACS), which are integral to operational technology (OT) environments. Unauthorized access to these modules could allow attackers to alter control logic or parameters, potentially disrupting production lines, causing equipment damage, or leading to safety incidents. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise could have cascading effects on operational reliability and safety compliance. European organizations with interconnected IT and OT networks are particularly vulnerable if network segmentation is insufficient. Additionally, regulatory frameworks such as NIS2 and the EU Cybersecurity Act emphasize the protection of critical infrastructure, making exploitation of such vulnerabilities a compliance and reputational risk. The medium CVSS score suggests that exploitation requires some sophistication, but the absence of required privileges or user interaction lowers the barrier for remote attackers who can access the network segment hosting these devices.

Mitigation Recommendations

1. Network Segmentation: Isolate MELSEC WS Series modules within dedicated OT network segments with strict access controls to limit exposure to untrusted networks. 2. Monitoring and Logging: Implement enhanced monitoring of network traffic to and from these modules to detect unusual authentication attempts or replay patterns. 3. Access Control: Restrict network access to the modules only to authorized management stations and use VPNs or secure tunnels for remote access. 4. Vendor Coordination: Engage with Mitsubishi Electric Corporation for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 5. Replay Attack Mitigation: Where possible, deploy network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect replay attacks or anomalous authentication sequences. 6. Incident Response Preparedness: Develop and test incident response plans specific to OT environments to quickly isolate and remediate compromised modules. 7. Configuration Review: Audit and harden device configurations to disable unnecessary services and ensure strong authentication mechanisms are in place, if configurable. 8. Physical Security: Ensure physical access to the modules is restricted to prevent local exploitation or tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2023-11-29T00:52:59.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5b1b0bd07c3938c1a5

Added to database: 6/10/2025, 6:54:19 PM

Last enriched: 7/10/2025, 10:32:57 PM

Last updated: 8/2/2025, 12:57:12 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats