An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Hard-coded SSH keys allow an attacker to gain unauthorised access or disclose encrypted data on the RTU due to the keys not being regenerated on initial installation or with firmware updates. In other words, these devices use private-key values in /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_dsa_key files that are publicly available from the vendor web sites.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.mogozobo.com/ |
![]() ![]() |
https://www.mogozobo.com/?p=3593 |
![]() ![]() |
History
Tue, 10 Sep 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Hard-coded SSH keys allow an attacker to gain unauthorised access or disclose encrypted data on the RTU due to the keys not being regenerated on initial installation or with firmware updates. In other words, these devices use private-key values in /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_dsa_key files that are publicly available from the vendor web sites. | An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Hard-coded SSH keys allow an attacker to gain unauthorised access or disclose encrypted data on the RTU due to the keys not being regenerated on initial installation or with firmware updates. In other words, these devices use private-key values in /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_dsa_key files that are publicly available from the vendor web sites. |

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-10T17:08:12.590855
Reserved: 2019-08-10T00:00:00
Link: CVE-2019-14926

No data.

Status : Modified
Published: 2019-10-28T13:15:10.697
Modified: 2024-11-21T04:27:41.853
Link: CVE-2019-14926

No data.