CVE-2023-6942: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation EZSocket
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally.
AI Analysis
Technical Summary
CVE-2023-6942 is a high-severity vulnerability identified in multiple Mitsubishi Electric Corporation products, specifically related to the EZSocket communication protocol and associated software suites used in industrial automation and control systems. The affected products include EZSocket versions 3.0 to 5.92, GT Designer3 Version1 (GOT1000) versions 1.325P and prior, GT Designer3 Version1 (GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H, and all versions of MX OPC Server DA/UA. The core issue is a CWE-306: Missing Authentication for Critical Function, which allows a remote unauthenticated attacker to bypass authentication mechanisms by sending specially crafted packets to these products. This bypass enables unauthorized connection and interaction with the affected systems without any user authentication or interaction, potentially allowing attackers to manipulate industrial control processes or disrupt operations. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The impact is primarily on integrity (I:H), with no direct confidentiality or availability impact noted. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that mitigation efforts should focus on detection and network-level protections until official fixes are available.
Potential Impact
For European organizations, especially those operating in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. Mitsubishi Electric's industrial automation products are widely used across Europe for programmable logic controllers (PLCs), human-machine interfaces (HMIs), and supervisory control and data acquisition (SCADA) systems. An attacker exploiting this vulnerability could gain unauthorized control over critical industrial processes, leading to data integrity breaches, manipulation of operational parameters, or sabotage of production lines. Such disruptions could result in financial losses, safety hazards, regulatory non-compliance, and damage to reputation. Given the lack of authentication, attackers do not need credentials or user interaction, increasing the risk of automated or remote exploitation. The impact is heightened in sectors where operational continuity and process integrity are paramount, such as automotive manufacturing hubs in Germany, energy grids in France and Spain, and chemical plants in the Netherlands and Belgium. Additionally, the potential for targeted attacks leveraging this vulnerability aligns with concerns over industrial cyber espionage and sabotage in the current geopolitical climate.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Mitsubishi Electric devices and systems from general enterprise networks and restrict access to trusted management networks only. 2. Implement strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized EZSocket protocol traffic, especially from untrusted or external sources. 3. Employ network anomaly detection tools tailored for industrial control system (ICS) protocols to identify unusual connection attempts or malformed packets indicative of exploitation attempts. 4. Restrict remote access to affected devices using VPNs with strong multi-factor authentication and limit access to known IP addresses. 5. Regularly audit and inventory Mitsubishi Electric products in use, verifying versions and configurations to prioritize patching once official updates become available. 6. Engage with Mitsubishi Electric support channels to obtain patches or workarounds as soon as they are released. 7. Develop and test incident response plans specific to ICS environments to quickly contain and remediate potential breaches exploiting this vulnerability. 8. Educate operational technology (OT) personnel about the risks and signs of exploitation related to this vulnerability to enhance early detection.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, United Kingdom, Poland, Czech Republic, Sweden
CVE-2023-6942: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation EZSocket
Description
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally.
AI-Powered Analysis
Technical Analysis
CVE-2023-6942 is a high-severity vulnerability identified in multiple Mitsubishi Electric Corporation products, specifically related to the EZSocket communication protocol and associated software suites used in industrial automation and control systems. The affected products include EZSocket versions 3.0 to 5.92, GT Designer3 Version1 (GOT1000) versions 1.325P and prior, GT Designer3 Version1 (GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H, and all versions of MX OPC Server DA/UA. The core issue is a CWE-306: Missing Authentication for Critical Function, which allows a remote unauthenticated attacker to bypass authentication mechanisms by sending specially crafted packets to these products. This bypass enables unauthorized connection and interaction with the affected systems without any user authentication or interaction, potentially allowing attackers to manipulate industrial control processes or disrupt operations. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N). The impact is primarily on integrity (I:H), with no direct confidentiality or availability impact noted. No known exploits are currently reported in the wild, and no patches have been linked yet, which suggests that mitigation efforts should focus on detection and network-level protections until official fixes are available.
Potential Impact
For European organizations, especially those operating in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. Mitsubishi Electric's industrial automation products are widely used across Europe for programmable logic controllers (PLCs), human-machine interfaces (HMIs), and supervisory control and data acquisition (SCADA) systems. An attacker exploiting this vulnerability could gain unauthorized control over critical industrial processes, leading to data integrity breaches, manipulation of operational parameters, or sabotage of production lines. Such disruptions could result in financial losses, safety hazards, regulatory non-compliance, and damage to reputation. Given the lack of authentication, attackers do not need credentials or user interaction, increasing the risk of automated or remote exploitation. The impact is heightened in sectors where operational continuity and process integrity are paramount, such as automotive manufacturing hubs in Germany, energy grids in France and Spain, and chemical plants in the Netherlands and Belgium. Additionally, the potential for targeted attacks leveraging this vulnerability aligns with concerns over industrial cyber espionage and sabotage in the current geopolitical climate.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected Mitsubishi Electric devices and systems from general enterprise networks and restrict access to trusted management networks only. 2. Implement strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized EZSocket protocol traffic, especially from untrusted or external sources. 3. Employ network anomaly detection tools tailored for industrial control system (ICS) protocols to identify unusual connection attempts or malformed packets indicative of exploitation attempts. 4. Restrict remote access to affected devices using VPNs with strong multi-factor authentication and limit access to known IP addresses. 5. Regularly audit and inventory Mitsubishi Electric products in use, verifying versions and configurations to prioritize patching once official updates become available. 6. Engage with Mitsubishi Electric support channels to obtain patches or workarounds as soon as they are released. 7. Develop and test incident response plans specific to ICS environments to quickly contain and remediate potential breaches exploiting this vulnerability. 8. Educate operational technology (OT) personnel about the risks and signs of exploitation related to this vulnerability to enhance early detection.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2023-12-19T08:00:02.751Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae282966a
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:12:58 AM
Last updated: 8/12/2025, 1:29:55 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.