{"uuid": "5f8b9520-5f6d-42ee-abb0-efc0082564ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-4699", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5618", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-4699\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.\n\ud83d\udccf Published: 2023-11-06T05:02:15.543Z\n\ud83d\udccf Modified: 2025-02-26T21:08:34.758Z\n\ud83d\udd17 References:\n1. https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-013_en.pdf\n2. https://jvn.jp/vu/JVNVU94620134/\n3. https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-03", "creation_timestamp": "2025-02-26T21:25:33.000000Z"}