Mitsubishi Electric GOT (Update A)
A VNC server authentication bypass vulnerability exists in Mitsubishi Electric GOT2000 and GOT SIMPLE series human-machine interface devices. The VNC server fails to properly verify credentials during the login process, allowing an attacker to gain unauthorized access without a valid password. The vulnerability affects multiple model variants with different vulnerable versions and patched versions. High attack complexity is required to exploit this vulnerability; no known public exploits exist. GOT2000 GT27 and GT25 models have no fix available. GOT2000 GT21 models (GT2107-WTBD and GT2107-WTSD) and GOT SIMPLE GS21 models (GS2110-WTBD-N and GS2107-WTBD-N) have patches available.
- Network access to the VNC server port on the affected GOT device
- High attack complexity required—attacker must craft specific authentication bypass payloads
Patching may require device reboot — plan for process interruption
/api/v1/advisories/77d4c7a8-976b-43a5-8254-4ca3cafe4373