{"uuid": "b476802e-8296-4f09-a2b4-5744bc0d6cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6374", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17760", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-6374\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all serial numbers allows a remote unauthenticated attacker to bypass authentication by capture-replay attack and illegally login to the affected module. As a result, the remote attacker who has logged in illegally may be able to disclose or tamper with the programs and parameters in the modules.\n\ud83d\udccf Published: 2024-01-30T09:00:14.800Z\n\ud83d\udccf Modified: 2025-06-09T18:35:44.426Z\n\ud83d\udd17 References:\n1. https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-019_en.pdf\n2. https://jvn.jp/vu/JVNVU99497477\n3. https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-03", "creation_timestamp": "2025-06-09T19:48:27.000000Z"}