Mitsubishi Electric GT and GOT Series Products
A cryptographic weakness in Mitsubishi Electric GOT2000 and GOT SIMPLE HMI terminal products, as well as GT Designer3 Version1 (GOT2000) and GT SoftGOT2000 engineering software, allows an attacker on the network to sniff encrypted password packets and decrypt them in plaintext. This affects GOT2000 models GT21, GT23, GT25, and GT27 running firmware version 01.49.000 or earlier, GOT SIMPLE models GS25 and GS21 running firmware 01.49.000 or earlier, and the engineering/emulation software versions 1.295H or earlier. Successful exploitation allows an attacker to obtain operator and engineer credentials, potentially enabling unauthorized control of connected industrial processes.
- Network access to the same LAN as the GOT device, or remote access if the device is exposed to the Internet
- Ability to capture network traffic (packet sniffer running on the attacker's computer or a compromised device on the network)
- No authentication or special privileges required to perform the attack
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ed5fd13f-9e0e-4764-aab2-0b86be9a739aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.