Vulnerability Description
Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mitsubishielectric | Gx Works3 | All versions |
| Mitsubishielectric | Melsoft Iq Appportal | All versions |
| Mitsubishielectric | Melsoft Navigator | All versions |
| Mitsubishielectric | Motion Control Setting | All versions |
Related Weaknesses (CWE)
References
- https://jvn.jp/vu/JVNVU93383160/MitigationThird Party Advisory
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-016_en.pdfMitigationVendor Advisory
- https://jvn.jp/vu/JVNVU93383160/MitigationThird Party Advisory
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-016_en.pdfMitigationVendor Advisory
FAQ
What is CVE-2023-5247?
CVE-2023-5247 is a vulnerability with a CVSS score of 7.8 (HIGH). Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious ...
How severe is CVE-2023-5247?
CVE-2023-5247 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5247?
Check the references section above for vendor advisories and patch information. Affected products include: Mitsubishielectric Gx Works3, Mitsubishielectric Melsoft Iq Appportal, Mitsubishielectric Melsoft Navigator, Mitsubishielectric Motion Control Setting.