CVE-2024-1573: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Iconics Digital Solutions GENESIS64
CVE-2024-1573 is a medium severity vulnerability affecting Mitsubishi Electric Iconics Digital Solutions GENESIS64 and related products versions 10. 97 to 10. 97. 2. It involves missing authentication for a critical function in the mobile monitoring feature, allowing remote unauthenticated attackers to bypass login under specific conditions involving Active Directory integration and IIS application pool configuration. Exploitation requires that the Automatic log in option is enabled, the IcoAnyGlass IIS Application Pool runs under an Active Directory Domain Account, and that account has login permissions in GENESIS64 or MC Works64 security settings. The vulnerability impacts the integrity of the system by allowing unauthorized access but does not affect confidentiality or availability directly. No known exploits are currently reported in the wild. European organizations using affected Mitsubishi Electric products, especially in industrial automation or critical infrastructure sectors, should prioritize mitigation. Countries with significant industrial automation deployments and Mitsubishi Electric customer bases, such as Germany, France, Italy, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2024-1573 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 through 10.97.2, ICONICS Suite versions 10.97 through 10.97.2, and all versions of MC Works64. The flaw resides in the mobile monitoring feature, where an attacker can bypass authentication and gain unauthorized access remotely if certain conditions are met. These conditions include the use of Active Directory in the security settings, enabling the “Automatic log in” option, running the IcoAnyGlass IIS Application Pool under an Active Directory Domain Account, and that account having login permissions within GENESIS64 or MC Works64 security configurations. The vulnerability allows an unauthenticated remote attacker to log in without credentials, compromising system integrity by potentially manipulating or controlling industrial processes monitored or managed by these systems. The CVSS v3.1 base score is 5.9 (medium severity), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and impact limited to integrity. No exploits have been reported in the wild yet, but the conditions for exploitation are specific and relate to particular configurations involving Active Directory and IIS application pools. This vulnerability is critical in environments where GENESIS64 and related products are used for industrial automation, building management, or critical infrastructure monitoring, as unauthorized access could lead to manipulation of control systems or data. The lack of authentication on a critical function exposes these systems to potential sabotage or operational disruption if exploited.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk to operational integrity. Unauthorized access could allow attackers to alter control parameters, disrupt monitoring, or manipulate system behavior, potentially leading to safety hazards, production downtime, or regulatory non-compliance. Since the vulnerability requires specific Active Directory and IIS configurations, organizations using these Microsoft technologies in conjunction with Mitsubishi Electric Iconics products are at higher risk. The impact is primarily on system integrity, with no direct confidentiality or availability impact noted. However, integrity compromises in industrial control systems can cascade into safety incidents or operational failures. European organizations with complex IT/OT integration environments must assess their exposure carefully. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the medium CVSS score and the critical nature of affected systems.
Mitigation Recommendations
1. Immediately review and disable the “Automatic log in” option in the security settings of GENESIS64, ICONICS Suite, and MC Works64 where applicable. 2. Audit the IcoAnyGlass IIS Application Pool configuration to ensure it does not run under an Active Directory Domain Account with unnecessary permissions. 3. Restrict the IIS Application Pool account’s permissions in GENESIS64 and MC Works64 security settings to the minimum necessary, ideally removing login permissions if not required. 4. Implement network segmentation and access controls to limit exposure of the affected systems to untrusted networks. 5. Monitor logs for unusual login attempts or access patterns related to the mobile monitoring feature. 6. Engage with Mitsubishi Electric Iconics for any forthcoming patches or updates addressing this vulnerability and apply them promptly. 7. Conduct a thorough security review of Active Directory integration and authentication mechanisms in industrial control systems to prevent similar misconfigurations. 8. Educate system administrators on the risks of enabling automatic login features in critical industrial applications.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2024-1573: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Iconics Digital Solutions GENESIS64
Description
CVE-2024-1573 is a medium severity vulnerability affecting Mitsubishi Electric Iconics Digital Solutions GENESIS64 and related products versions 10. 97 to 10. 97. 2. It involves missing authentication for a critical function in the mobile monitoring feature, allowing remote unauthenticated attackers to bypass login under specific conditions involving Active Directory integration and IIS application pool configuration. Exploitation requires that the Automatic log in option is enabled, the IcoAnyGlass IIS Application Pool runs under an Active Directory Domain Account, and that account has login permissions in GENESIS64 or MC Works64 security settings. The vulnerability impacts the integrity of the system by allowing unauthorized access but does not affect confidentiality or availability directly. No known exploits are currently reported in the wild. European organizations using affected Mitsubishi Electric products, especially in industrial automation or critical infrastructure sectors, should prioritize mitigation. Countries with significant industrial automation deployments and Mitsubishi Electric customer bases, such as Germany, France, Italy, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2024-1573 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 through 10.97.2, ICONICS Suite versions 10.97 through 10.97.2, and all versions of MC Works64. The flaw resides in the mobile monitoring feature, where an attacker can bypass authentication and gain unauthorized access remotely if certain conditions are met. These conditions include the use of Active Directory in the security settings, enabling the “Automatic log in” option, running the IcoAnyGlass IIS Application Pool under an Active Directory Domain Account, and that account having login permissions within GENESIS64 or MC Works64 security configurations. The vulnerability allows an unauthenticated remote attacker to log in without credentials, compromising system integrity by potentially manipulating or controlling industrial processes monitored or managed by these systems. The CVSS v3.1 base score is 5.9 (medium severity), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and impact limited to integrity. No exploits have been reported in the wild yet, but the conditions for exploitation are specific and relate to particular configurations involving Active Directory and IIS application pools. This vulnerability is critical in environments where GENESIS64 and related products are used for industrial automation, building management, or critical infrastructure monitoring, as unauthorized access could lead to manipulation of control systems or data. The lack of authentication on a critical function exposes these systems to potential sabotage or operational disruption if exploited.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk to operational integrity. Unauthorized access could allow attackers to alter control parameters, disrupt monitoring, or manipulate system behavior, potentially leading to safety hazards, production downtime, or regulatory non-compliance. Since the vulnerability requires specific Active Directory and IIS configurations, organizations using these Microsoft technologies in conjunction with Mitsubishi Electric Iconics products are at higher risk. The impact is primarily on system integrity, with no direct confidentiality or availability impact noted. However, integrity compromises in industrial control systems can cascade into safety incidents or operational failures. European organizations with complex IT/OT integration environments must assess their exposure carefully. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially given the medium CVSS score and the critical nature of affected systems.
Mitigation Recommendations
1. Immediately review and disable the “Automatic log in” option in the security settings of GENESIS64, ICONICS Suite, and MC Works64 where applicable. 2. Audit the IcoAnyGlass IIS Application Pool configuration to ensure it does not run under an Active Directory Domain Account with unnecessary permissions. 3. Restrict the IIS Application Pool account’s permissions in GENESIS64 and MC Works64 security settings to the minimum necessary, ideally removing login permissions if not required. 4. Implement network segmentation and access controls to limit exposure of the affected systems to untrusted networks. 5. Monitor logs for unusual login attempts or access patterns related to the mobile monitoring feature. 6. Engage with Mitsubishi Electric Iconics for any forthcoming patches or updates addressing this vulnerability and apply them promptly. 7. Conduct a thorough security review of Active Directory integration and authentication mechanisms in industrial control systems to prevent similar misconfigurations. 8. Educate system administrators on the risks of enabling automatic login features in critical industrial applications.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2024-02-16T01:30:41.285Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695f9d8ec901b06321e4127f
Added to database: 1/8/2026, 12:05:34 PM
Last enriched: 1/15/2026, 12:43:34 PM
Last updated: 2/7/2026, 12:14:17 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.