Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection) vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products.
The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ezsocket | Mitsubishielectric | 3.0 (including) | * |
Fr_configurator2 | Mitsubishielectric | * | * |
Got1000 | Mitsubishielectric | * | * |
Got2000 | Mitsubishielectric | * | * |
Gx_works2 | Mitsubishielectric | 1.11m (including) | * |
Gx_works3 | Mitsubishielectric | * | * |
Mc_works64 | Mitsubishielectric | * | * |
Melsoft_navigator | Mitsubishielectric | 1.04e (including) | * |
Mt_works2 | Mitsubishielectric | * | * |
Mx_component | Mitsubishielectric | 4.00a (including) | * |