Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33587 | Use of Hard-coded Password vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to obtain a hard-coded password and access to the module via FTP. |
Wed, 05 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Mitsubishi
Published:
Updated: 2025-03-05T18:58:23.764Z
Reserved: 2023-04-14T08:44:04.100Z
Link: CVE-2023-2061
Updated: 2024-08-02T06:12:19.938Z
Status : Modified
Published: 2023-06-02T05:15:10.100
Modified: 2024-11-21T07:57:51.733
Link: CVE-2023-2061
No data.
OpenCVE Enrichment
No data.
EUVD