Mitsubishi MX Component ActiveX Remote Code Execution

critical Nessus Plugin ID 66761

Synopsis

The remote host is affected by multiple remote code execution vulnerabilities.

Description

The Mitsubishi MX Component v3 'ActUWzd.dll' ActiveX control was found on the remote host. This control has several methods that are vulnerable to a heap-based buffer overflow. A remote attacker may be able to execute arbitrary code by tricking a victim into opening a specially crafted web page.

Solution

Disable the control or upgrade to Mitsubishi MX Component 4.03 or later.

See Also

https://support.microsoft.com/en-us/help/240797/how-to-stop-an-activex-control-from-running-in-internet-explorer

http://www.nessus.org/u?76dd9253

Plugin Details

Severity: Critical

ID: 66761

File Name: scada_mitsubishi_mx_component_activex.nbin

Version: 1.211

Type: local

Family: SCADA

Published: 6/3/2013

Updated: 3/26/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-3075

Vulnerability Information

CPE: cpe:/a:mitsubishi-automation:mitsubishi_mx_component

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/21/2013

Vulnerability Publication Date: 3/25/2013

Reference Information

CVE: CVE-2013-3075

BID: 58692

ICS-ALERT: 13-091-01