CVE-2024-1573: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Iconics Digital Solutions GENESIS64
Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.2, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.2, and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: * Active Directory is used in the security setting. * “Automatic log in” option is enabled in the security setting. * The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. * The IcoAnyGlass IIS Application Pool account is included in GENESIS64 and MC Works64 Security and has permission to log in.
AI Analysis
Technical Summary
CVE-2024-1573 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.2, ICONICS Suite versions 10.97 to 10.97.2, and all versions of MC Works64. The flaw arises in the mobile monitoring feature when the system is configured to use Active Directory for security, the 'Automatic log in' option is enabled, and the IcoAnyGlass IIS Application Pool runs under an Active Directory Domain Account that has login permissions within the GENESIS64 or MC Works64 security framework. Under these conditions, a remote attacker can bypass authentication entirely and gain unauthorized access to the system. The vulnerability does not require user interaction or prior authentication, but exploitation complexity is high due to the specific configuration prerequisites. The attack vector is network-based (AV:N), with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact primarily affects integrity (I:H) by allowing unauthorized system access, but confidentiality (C:N) and availability (A:N) remain unaffected. No public exploits have been reported yet, and no patches are currently linked, indicating a need for vigilance and configuration review by users of affected products.
Potential Impact
For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors using Mitsubishi Electric Iconics Digital Solutions, this vulnerability poses a risk of unauthorized access to control and monitoring systems. The integrity of operational data and control commands can be compromised, potentially leading to manipulation of industrial processes or falsification of monitoring data. While confidentiality and availability are not directly impacted, unauthorized access could facilitate further attacks or insider threats. The reliance on Active Directory and IIS Application Pool configurations means organizations with complex domain environments are at higher risk. Disruption or manipulation of industrial control systems could have cascading effects on production, safety, and compliance with regulatory requirements such as NIS2 in the EU. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting these specific configurations.
Mitigation Recommendations
European organizations should immediately audit their GENESIS64, ICONICS Suite, and MC Works64 deployments to verify if the affected versions (10.97 to 10.97.2) are in use. Key mitigation steps include: 1) Disable the 'Automatic log in' option in the security settings to prevent bypassing authentication. 2) Review and restrict the permissions of the IcoAnyGlass IIS Application Pool account, ensuring it is not unnecessarily included in GENESIS64 or MC Works64 security groups with login rights. 3) Consider running the IIS Application Pool under a non-Active Directory account or one with minimal privileges. 4) Implement network segmentation and strict firewall rules to limit access to the IIS Application Pool endpoints. 5) Monitor logs for unusual login attempts or access patterns related to the mobile monitoring feature. 6) Engage with Mitsubishi Electric for official patches or updates and apply them promptly once available. 7) Conduct regular security assessments of Active Directory integration and IIS configurations to detect misconfigurations that could facilitate exploitation.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2024-1573: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Iconics Digital Solutions GENESIS64
Description
Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.2, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.2, and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: * Active Directory is used in the security setting. * “Automatic log in” option is enabled in the security setting. * The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. * The IcoAnyGlass IIS Application Pool account is included in GENESIS64 and MC Works64 Security and has permission to log in.
AI-Powered Analysis
Technical Analysis
CVE-2024-1573 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.2, ICONICS Suite versions 10.97 to 10.97.2, and all versions of MC Works64. The flaw arises in the mobile monitoring feature when the system is configured to use Active Directory for security, the 'Automatic log in' option is enabled, and the IcoAnyGlass IIS Application Pool runs under an Active Directory Domain Account that has login permissions within the GENESIS64 or MC Works64 security framework. Under these conditions, a remote attacker can bypass authentication entirely and gain unauthorized access to the system. The vulnerability does not require user interaction or prior authentication, but exploitation complexity is high due to the specific configuration prerequisites. The attack vector is network-based (AV:N), with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact primarily affects integrity (I:H) by allowing unauthorized system access, but confidentiality (C:N) and availability (A:N) remain unaffected. No public exploits have been reported yet, and no patches are currently linked, indicating a need for vigilance and configuration review by users of affected products.
Potential Impact
For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors using Mitsubishi Electric Iconics Digital Solutions, this vulnerability poses a risk of unauthorized access to control and monitoring systems. The integrity of operational data and control commands can be compromised, potentially leading to manipulation of industrial processes or falsification of monitoring data. While confidentiality and availability are not directly impacted, unauthorized access could facilitate further attacks or insider threats. The reliance on Active Directory and IIS Application Pool configurations means organizations with complex domain environments are at higher risk. Disruption or manipulation of industrial control systems could have cascading effects on production, safety, and compliance with regulatory requirements such as NIS2 in the EU. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting these specific configurations.
Mitigation Recommendations
European organizations should immediately audit their GENESIS64, ICONICS Suite, and MC Works64 deployments to verify if the affected versions (10.97 to 10.97.2) are in use. Key mitigation steps include: 1) Disable the 'Automatic log in' option in the security settings to prevent bypassing authentication. 2) Review and restrict the permissions of the IcoAnyGlass IIS Application Pool account, ensuring it is not unnecessarily included in GENESIS64 or MC Works64 security groups with login rights. 3) Consider running the IIS Application Pool under a non-Active Directory account or one with minimal privileges. 4) Implement network segmentation and strict firewall rules to limit access to the IIS Application Pool endpoints. 5) Monitor logs for unusual login attempts or access patterns related to the mobile monitoring feature. 6) Engage with Mitsubishi Electric for official patches or updates and apply them promptly once available. 7) Conduct regular security assessments of Active Directory integration and IIS configurations to detect misconfigurations that could facilitate exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2024-02-16T01:30:41.285Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695f9d8ec901b06321e4127f
Added to database: 1/8/2026, 12:05:34 PM
Last enriched: 1/8/2026, 12:19:46 PM
Last updated: 1/9/2026, 1:41:46 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22714: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Monaco Skin
LowCVE-2026-22710: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Wikibase Extension
LowCVE-2026-0733: SQL Injection in PHPGurukul Online Course Registration System
MediumCVE-2026-0732: Command Injection in D-Link DI-8200G
MediumCVE-2026-0731: NULL Pointer Dereference in TOTOLINK WA1200
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.