An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.
References
Link | Resource |
---|---|
https://www.mogozobo.com/ | Third Party Advisory |
https://www.mogozobo.com/?p=3593 | Exploit Third Party Advisory |
Configurations
History
10 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service. |
Information
Published : 2019-10-28 13:15
Updated : 2024-09-10 18:15
NVD link : CVE-2019-14929
Mitre link : CVE-2019-14929
CVE.ORG link : CVE-2019-14929
JSON object : View
Products Affected
inea
- me-rtu
- me-rtu_firmware
mitsubishielectric
- smartrtu_firmware
- smartrtu
CWE
CWE-522
Insufficiently Protected Credentials