Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Mitsubishielectric
Subscribe
|
Melsec Iq-fx5u-32mr\/ds
Subscribe
Melsec Iq-fx5u-32mr\/ds Firmware
Subscribe
Melsec Iq-fx5u-32mr\/dss
Subscribe
Melsec Iq-fx5u-32mr\/dss Firmware
Subscribe
Melsec Iq-fx5u-32mr\/es
Subscribe
Melsec Iq-fx5u-32mr\/es Firmware
Subscribe
Melsec Iq-fx5u-32mr\/ess
Subscribe
Melsec Iq-fx5u-32mr\/ess Firmware
Subscribe
Melsec Iq-fx5u-32mt\/ds
Subscribe
Melsec Iq-fx5u-32mt\/ds Firmware
Subscribe
Melsec Iq-fx5u-32mt\/dss
Subscribe
Melsec Iq-fx5u-32mt\/dss Firmware
Subscribe
Melsec Iq-fx5u-32mt\/es
Subscribe
Melsec Iq-fx5u-32mt\/es Firmware
Subscribe
Melsec Iq-fx5u-32mt\/ess
Subscribe
Melsec Iq-fx5u-32mt\/ess Firmware
Subscribe
Melsec Iq-fx5u-64mr\/ds
Subscribe
Melsec Iq-fx5u-64mr\/ds Firmware
Subscribe
Melsec Iq-fx5u-64mr\/dss
Subscribe
Melsec Iq-fx5u-64mr\/dss Firmware
Subscribe
Melsec Iq-fx5u-64mr\/es
Subscribe
Melsec Iq-fx5u-64mr\/es Firmware
Subscribe
Melsec Iq-fx5u-64mr\/ess
Subscribe
Melsec Iq-fx5u-64mr\/ess Firmware
Subscribe
Melsec Iq-fx5u-64mt\/ds
Subscribe
Melsec Iq-fx5u-64mt\/ds Firmware
Subscribe
Melsec Iq-fx5u-64mt\/dss
Subscribe
Melsec Iq-fx5u-64mt\/dss Firmware
Subscribe
Melsec Iq-fx5u-64mt\/es
Subscribe
Melsec Iq-fx5u-64mt\/es Firmware
Subscribe
Melsec Iq-fx5u-64mt\/ess
Subscribe
Melsec Iq-fx5u-64mt\/ess Firmware
Subscribe
Melsec Iq-fx5u-80mr\/ds
Subscribe
Melsec Iq-fx5u-80mr\/ds Firmware
Subscribe
Melsec Iq-fx5u-80mr\/dss
Subscribe
Melsec Iq-fx5u-80mr\/dss Firmware
Subscribe
Melsec Iq-fx5u-80mr\/es
Subscribe
Melsec Iq-fx5u-80mr\/es Firmware
Subscribe
Melsec Iq-fx5u-80mr\/ess
Subscribe
Melsec Iq-fx5u-80mr\/ess Firmware
Subscribe
Melsec Iq-fx5u-80mt\/ds
Subscribe
Melsec Iq-fx5u-80mt\/ds Firmware
Subscribe
Melsec Iq-fx5u-80mt\/dss
Subscribe
Melsec Iq-fx5u-80mt\/dss Firmware
Subscribe
Melsec Iq-fx5u-80mt\/es
Subscribe
Melsec Iq-fx5u-80mt\/es Firmware
Subscribe
Melsec Iq-fx5u-80mt\/ess
Subscribe
Melsec Iq-fx5u-80mt\/ess Firmware
Subscribe
Melsec Iq-fx5uc-32mr\/dds
Subscribe
Melsec Iq-fx5uc-32mr\/dds Firmware
Subscribe
Melsec Iq-fx5uc-32mr\/ds
Subscribe
Melsec Iq-fx5uc-32mr\/ds-ts
Subscribe
Melsec Iq-fx5uc-32mr\/ds-ts Firmware
Subscribe
Melsec Iq-fx5uc-32mr\/ds Firmware
Subscribe
Melsec Iq-fx5uc-32mt\/dds
Subscribe
Melsec Iq-fx5uc-32mt\/dds Firmware
Subscribe
Melsec Iq-fx5uc-32mt\/ds
Subscribe
Melsec Iq-fx5uc-32mt\/ds-ts
Subscribe
Melsec Iq-fx5uc-32mt\/ds-ts Firmware
Subscribe
Melsec Iq-fx5uc-32mt\/ds Firmware
Subscribe
Melsec Iq-fx5uc-32mt\/dss-ts
Subscribe
Melsec Iq-fx5uc-32mt\/dss-ts Firmware
Subscribe
Melsec Iq-fx5uc-64mr\/dds
Subscribe
Melsec Iq-fx5uc-64mr\/dds Firmware
Subscribe
Melsec Iq-fx5uc-64mr\/ds
Subscribe
Melsec Iq-fx5uc-64mr\/ds Firmware
Subscribe
Melsec Iq-fx5uc-64mt\/dds
Subscribe
Melsec Iq-fx5uc-64mt\/dds Firmware
Subscribe
Melsec Iq-fx5uc-64mt\/ds
Subscribe
Melsec Iq-fx5uc-64mt\/ds Firmware
Subscribe
Melsec Iq-fx5uc-96mr\/dds
Subscribe
Melsec Iq-fx5uc-96mr\/dds Firmware
Subscribe
Melsec Iq-fx5uc-96mr\/ds
Subscribe
Melsec Iq-fx5uc-96mr\/ds Firmware
Subscribe
Melsec Iq-fx5uc-96mt\/dds
Subscribe
Melsec Iq-fx5uc-96mt\/dds Firmware
Subscribe
Melsec Iq-fx5uc-96mt\/ds
Subscribe
Melsec Iq-fx5uc-96mt\/ds Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23677 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 05 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Mitsubishi
Published:
Updated: 2025-03-05T18:59:00.469Z
Reserved: 2023-03-16T02:10:25.722Z
Link: CVE-2023-1424
Updated: 2024-08-02T05:49:11.688Z
Status : Modified
Published: 2023-05-24T05:15:08.780
Modified: 2024-11-21T07:39:09.593
Link: CVE-2023-1424
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD