CVE-2019-14929

An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.
References
Link Resource
https://www.mogozobo.com/ Third Party Advisory
https://www.mogozobo.com/?p=3593 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mitsubishielectric:smartrtu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:smartrtu:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inea:me-rtu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inea:me-rtu:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-10-28 13:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-14929

Mitre link : CVE-2019-14929

CVE.ORG link : CVE-2019-14929


JSON object : View

Products Affected

inea

  • me-rtu_firmware
  • me-rtu

mitsubishielectric

  • smartrtu
  • smartrtu_firmware
CWE
CWE-522

Insufficiently Protected Credentials