Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.

Project Subscriptions

Vendors Products
Mitsubishielectric Subscribe
Melsec Iq-fx5u-32mr\/ds Subscribe
Melsec Iq-fx5u-32mr\/ds Firmware Subscribe
Melsec Iq-fx5u-32mr\/dss Subscribe
Melsec Iq-fx5u-32mr\/dss Firmware Subscribe
Melsec Iq-fx5u-32mr\/es Subscribe
Melsec Iq-fx5u-32mr\/es Firmware Subscribe
Melsec Iq-fx5u-32mr\/ess Subscribe
Melsec Iq-fx5u-32mr\/ess Firmware Subscribe
Melsec Iq-fx5u-32mt\/ds Subscribe
Melsec Iq-fx5u-32mt\/ds Firmware Subscribe
Melsec Iq-fx5u-32mt\/dss Subscribe
Melsec Iq-fx5u-32mt\/dss Firmware Subscribe
Melsec Iq-fx5u-32mt\/es Subscribe
Melsec Iq-fx5u-32mt\/es Firmware Subscribe
Melsec Iq-fx5u-32mt\/ess Subscribe
Melsec Iq-fx5u-32mt\/ess Firmware Subscribe
Melsec Iq-fx5u-64mr\/ds Subscribe
Melsec Iq-fx5u-64mr\/ds Firmware Subscribe
Melsec Iq-fx5u-64mr\/dss Subscribe
Melsec Iq-fx5u-64mr\/dss Firmware Subscribe
Melsec Iq-fx5u-64mr\/es Subscribe
Melsec Iq-fx5u-64mr\/es Firmware Subscribe
Melsec Iq-fx5u-64mr\/ess Subscribe
Melsec Iq-fx5u-64mr\/ess Firmware Subscribe
Melsec Iq-fx5u-64mt\/ds Subscribe
Melsec Iq-fx5u-64mt\/ds Firmware Subscribe
Melsec Iq-fx5u-64mt\/dss Subscribe
Melsec Iq-fx5u-64mt\/dss Firmware Subscribe
Melsec Iq-fx5u-64mt\/es Subscribe
Melsec Iq-fx5u-64mt\/es Firmware Subscribe
Melsec Iq-fx5u-64mt\/ess Subscribe
Melsec Iq-fx5u-64mt\/ess Firmware Subscribe
Melsec Iq-fx5u-80mr\/ds Subscribe
Melsec Iq-fx5u-80mr\/ds Firmware Subscribe
Melsec Iq-fx5u-80mr\/dss Subscribe
Melsec Iq-fx5u-80mr\/dss Firmware Subscribe
Melsec Iq-fx5u-80mr\/es Subscribe
Melsec Iq-fx5u-80mr\/es Firmware Subscribe
Melsec Iq-fx5u-80mr\/ess Subscribe
Melsec Iq-fx5u-80mr\/ess Firmware Subscribe
Melsec Iq-fx5u-80mt\/ds Subscribe
Melsec Iq-fx5u-80mt\/ds Firmware Subscribe
Melsec Iq-fx5u-80mt\/dss Subscribe
Melsec Iq-fx5u-80mt\/dss Firmware Subscribe
Melsec Iq-fx5u-80mt\/es Subscribe
Melsec Iq-fx5u-80mt\/es Firmware Subscribe
Melsec Iq-fx5u-80mt\/ess Subscribe
Melsec Iq-fx5u-80mt\/ess Firmware Subscribe
Melsec Iq-fx5uc-32mr\/dds Subscribe
Melsec Iq-fx5uc-32mr\/dds Firmware Subscribe
Melsec Iq-fx5uc-32mr\/ds Subscribe
Melsec Iq-fx5uc-32mr\/ds-ts Subscribe
Melsec Iq-fx5uc-32mr\/ds-ts Firmware Subscribe
Melsec Iq-fx5uc-32mr\/ds Firmware Subscribe
Melsec Iq-fx5uc-32mt\/dds Subscribe
Melsec Iq-fx5uc-32mt\/dds Firmware Subscribe
Melsec Iq-fx5uc-32mt\/ds Subscribe
Melsec Iq-fx5uc-32mt\/ds-ts Subscribe
Melsec Iq-fx5uc-32mt\/ds-ts Firmware Subscribe
Melsec Iq-fx5uc-32mt\/ds Firmware Subscribe
Melsec Iq-fx5uc-32mt\/dss-ts Subscribe
Melsec Iq-fx5uc-32mt\/dss-ts Firmware Subscribe
Melsec Iq-fx5uc-64mr\/dds Subscribe
Melsec Iq-fx5uc-64mr\/dds Firmware Subscribe
Melsec Iq-fx5uc-64mr\/ds Subscribe
Melsec Iq-fx5uc-64mr\/ds Firmware Subscribe
Melsec Iq-fx5uc-64mt\/dds Subscribe
Melsec Iq-fx5uc-64mt\/dds Firmware Subscribe
Melsec Iq-fx5uc-64mt\/ds Subscribe
Melsec Iq-fx5uc-64mt\/ds Firmware Subscribe
Melsec Iq-fx5uc-96mr\/dds Subscribe
Melsec Iq-fx5uc-96mr\/dds Firmware Subscribe
Melsec Iq-fx5uc-96mr\/ds Subscribe
Melsec Iq-fx5uc-96mr\/ds Firmware Subscribe
Melsec Iq-fx5uc-96mt\/dds Subscribe
Melsec Iq-fx5uc-96mt\/dds Firmware Subscribe
Melsec Iq-fx5uc-96mt\/ds Subscribe
Melsec Iq-fx5uc-96mt\/ds Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-23677 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mitsubishi

Published:

Updated: 2025-03-05T18:59:00.469Z

Reserved: 2023-03-16T02:10:25.722Z

Link: CVE-2023-1424

cve-icon Vulnrichment

Updated: 2024-08-02T05:49:11.688Z

cve-icon NVD

Status : Modified

Published: 2023-05-24T05:15:08.780

Modified: 2024-11-21T07:39:09.593

Link: CVE-2023-1424

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses