Vulnerability Description
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote OS Command Injection vulnerability allows an attacker to execute arbitrary commands on the RTU due to the passing of unsafe user supplied data to the RTU's system shell. Functionality in mobile.php provides users with the ability to ping sites or IP addresses via Mobile Connection Test. When the Mobile Connection Test is submitted, action.php is called to execute the test. An attacker can use a shell command separator (;) in the host variable to execute operating system commands upon submitting the test data.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mitsubishielectric | Smartrtu Firmware | <= 2.02 |
| Mitsubishielectric | Smartrtu | - |
| Inea | Me-Rtu Firmware | <= 3.0 |
| Inea | Me-Rtu | - |
Related Weaknesses (CWE)
References
- https://www.mogozobo.com/Third Party Advisory
- https://www.mogozobo.com/?p=3593ExploitThird Party Advisory
- https://www.mogozobo.com/Third Party Advisory
- https://www.mogozobo.com/?p=3593ExploitThird Party Advisory
FAQ
What is CVE-2019-14931?
CVE-2019-14931 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote OS Command Injection vulnerability allows an attac...
How severe is CVE-2019-14931?
CVE-2019-14931 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-14931?
Check the references section above for vendor advisories and patch information. Affected products include: Mitsubishielectric Smartrtu Firmware, Mitsubishielectric Smartrtu, Inea Me-Rtu Firmware, Inea Me-Rtu.