Mitsubishi Electric Automation MC-WorX 8.x ActiveX Control Remote Code Execution

high Nessus Plugin ID 72708

Synopsis

The remote Windows host has an ActiveX control that is affected by a remote code execution vulnerability.

Description

Mitsubishi Electric Automation MC-WorX version 8.x was detected on the remote Windows Host. It is, therefore, affected by a remote code execution vulnerability due a flaw in an included ActiveX control, IcoLaunch.dll.

Solution

Apply the patch referenced in the vendor advisory or upgrade to version 9 or later.

See Also

http://www.meau.com/eprise/main/sites/public/Products/Software/-MC_Works

Plugin Details

Severity: High

ID: 72708

File Name: scada_mitsubishi_mc-worx_8_activex.nbin

Version: 1.267

Type: local

Agent: windows

Family: SCADA

Published: 2/26/2014

Updated: 3/26/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-2817

Vulnerability Information

CPE: cpe:/a:mitsubishielectric:mc-worx_suite

Required KB Items: SMB/mitsubishi_mc-worx/path, SMB/mitsubishi_mc-worx/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/20/2014

Vulnerability Publication Date: 9/15/2013

Reference Information

CVE: CVE-2013-2817

BID: 62414

ICSA: 14-051-02