CVE-2023-6942: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation EZSocket
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally.
AI Analysis
Technical Summary
CVE-2023-6942 is a high-severity vulnerability identified in multiple Mitsubishi Electric Corporation products, specifically related to the EZSocket communication protocol and associated software suites used in industrial automation and control systems. The affected products include EZSocket versions 3.0 to 5.92, GT Designer3 Version1 (GOT1000) versions 1.325P and prior, GT Designer3 Version1 (GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H, and all versions of MX OPC Server DA/UA. The core issue is a CWE-306: Missing Authentication for Critical Function, which allows a remote unauthenticated attacker to bypass authentication mechanisms by sending specially crafted packets to these products. This bypass enables unauthorized connection and interaction with the affected systems without any user authentication or interaction, potentially allowing attackers to manipulate industrial control processes or disrupt operations. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The impact is primarily on integrity (I:H), with no direct confidentiality or availability impact noted. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that mitigation efforts should focus on detection and network-level protections until official fixes are available.
Potential Impact
For European organizations, especially those operating in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. Mitsubishi Electric's industrial automation products are widely used across Europe for programmable logic controllers (PLCs), human-machine interfaces (HMIs), and supervisory control and data acquisition (SCADA) systems. An attacker exploiting this vulnerability could gain unauthorized control over critical industrial processes, leading to data integrity breaches, manipulation of operational parameters, or sabotage of production lines. Such disruptions could result in financial losses, safety hazards, regulatory non-compliance, and damage to reputation. Given the lack of authentication, attackers do not need credentials or user interaction, increasing the risk of automated or remote exploitation. The impact is heightened in sectors where operational continuity and process integrity are paramount, such as automotive manufacturing hubs in Germany, energy grids in France and Spain, and chemical plants in the Netherlands and Belgium. Additionally, the potential for targeted attacks leveraging this vulnerability aligns with concerns over industrial cyber espionage and sabotage in the current geopolitical climate.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Mitsubishi Electric devices and systems from general enterprise networks and restrict access to trusted management networks only. 2. Implement strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized EZSocket protocol traffic, especially from untrusted or external sources. 3. Employ network anomaly detection tools tailored for industrial control system (ICS) protocols to identify unusual connection attempts or malformed packets indicative of exploitation attempts. 4. Restrict remote access to affected devices using VPNs with strong multi-factor authentication and limit access to known IP addresses. 5. Regularly audit and inventory Mitsubishi Electric products in use, verifying versions and configurations to prioritize patching once official updates become available. 6. Engage with Mitsubishi Electric support channels to obtain patches or workarounds as soon as they are released. 7. Develop and test incident response plans specific to ICS environments to quickly contain and remediate potential breaches exploiting this vulnerability. 8. Educate operational technology (OT) personnel about the risks and signs of exploitation related to this vulnerability to enhance early detection.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, United Kingdom, Poland, Czech Republic, Sweden
CVE-2023-6942: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation EZSocket
Description
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally.
AI-Powered Analysis
Technical Analysis
CVE-2023-6942 is a high-severity vulnerability identified in multiple Mitsubishi Electric Corporation products, specifically related to the EZSocket communication protocol and associated software suites used in industrial automation and control systems. The affected products include EZSocket versions 3.0 to 5.92, GT Designer3 Version1 (GOT1000) versions 1.325P and prior, GT Designer3 Version1 (GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H, and all versions of MX OPC Server DA/UA. The core issue is a CWE-306: Missing Authentication for Critical Function, which allows a remote unauthenticated attacker to bypass authentication mechanisms by sending specially crafted packets to these products. This bypass enables unauthorized connection and interaction with the affected systems without any user authentication or interaction, potentially allowing attackers to manipulate industrial control processes or disrupt operations. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The impact is primarily on integrity (I:H), with no direct confidentiality or availability impact noted. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that mitigation efforts should focus on detection and network-level protections until official fixes are available.
Potential Impact
For European organizations, especially those operating in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. Mitsubishi Electric's industrial automation products are widely used across Europe for programmable logic controllers (PLCs), human-machine interfaces (HMIs), and supervisory control and data acquisition (SCADA) systems. An attacker exploiting this vulnerability could gain unauthorized control over critical industrial processes, leading to data integrity breaches, manipulation of operational parameters, or sabotage of production lines. Such disruptions could result in financial losses, safety hazards, regulatory non-compliance, and damage to reputation. Given the lack of authentication, attackers do not need credentials or user interaction, increasing the risk of automated or remote exploitation. The impact is heightened in sectors where operational continuity and process integrity are paramount, such as automotive manufacturing hubs in Germany, energy grids in France and Spain, and chemical plants in the Netherlands and Belgium. Additionally, the potential for targeted attacks leveraging this vulnerability aligns with concerns over industrial cyber espionage and sabotage in the current geopolitical climate.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Mitsubishi Electric devices and systems from general enterprise networks and restrict access to trusted management networks only. 2. Implement strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized EZSocket protocol traffic, especially from untrusted or external sources. 3. Employ network anomaly detection tools tailored for industrial control system (ICS) protocols to identify unusual connection attempts or malformed packets indicative of exploitation attempts. 4. Restrict remote access to affected devices using VPNs with strong multi-factor authentication and limit access to known IP addresses. 5. Regularly audit and inventory Mitsubishi Electric products in use, verifying versions and configurations to prioritize patching once official updates become available. 6. Engage with Mitsubishi Electric support channels to obtain patches or workarounds as soon as they are released. 7. Develop and test incident response plans specific to ICS environments to quickly contain and remediate potential breaches exploiting this vulnerability. 8. Educate operational technology (OT) personnel about the risks and signs of exploitation related to this vulnerability to enhance early detection.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2023-12-19T08:00:02.751Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae282966a
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:12:58 AM
Last updated: 10/15/2025, 2:21:09 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54278: Heap-based Buffer Overflow (CWE-122) in Adobe Bridge
MediumCVE-2025-54268: Heap-based Buffer Overflow (CWE-122) in Adobe Bridge
HighCVE-2024-13991: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Huijietong Cloud Video Platform
HighCVE-2023-7311: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in BYTEVALUE (Luoyang Baiwei Intelligent Technology Co., Ltd.) Flow Control Router
CriticalCVE-2023-7305: CWE-434 Unrestricted Upload of File with Dangerous Type in Guangzhou Smart Software Co., Ltd. SmartBI
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.