CWE-342
Predictable Exact Value from Previous Values
An exact value or random number can be precisely predicted by observing previous values.
CVE-2014-9196 (GCVE-0-2014-9196)
Vulnerability from cvelistv5 – Published: 2015-07-20 01:00 – Updated: 2025-09-05 21:11
VLAI?
Summary
Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Eaton’s Cooper Power Systems | Series Form 6 |
Affected:
Pro View 4.0 , ≤ Pro View 5.0
(custom)
|
|||||||
|
|||||||||
Credits
Dr. Raheem Beyah, David Formby, and San Shin Jung of Georgia Tech, via a research project partially sponsored by the Georgia Tech National Electric Energy Testing Research and Applications Center (NEETRAC)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:40:24.315Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "75936",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/75936"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-006-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Series Form 6",
"vendor": "Eaton\u2019s Cooper Power Systems",
"versions": [
{
"lessThanOrEqual": "Pro View 5.0",
"status": "affected",
"version": "Pro View 4.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Idea/IdeaPLUS relays",
"vendor": "Eaton\u2019s Cooper Power Systems",
"versions": [
{
"lessThanOrEqual": "Pro View 5.0",
"status": "affected",
"version": "Pro View 4.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dr. Raheem Beyah, David Formby, and San Shin Jung of Georgia Tech, via a research project partially sponsored by the Georgia Tech National Electric Energy Testing Research and Applications Center (NEETRAC)"
}
],
"datePublic": "2015-07-16T06:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eEaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.\u003c/p\u003e"
}
],
"value": "Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value."
}
],
"metrics": [
{
"cvssV2_0": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "CWE-342",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T21:11:15.864Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"name": "75936",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/75936"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-15-006-01"
},
{
"url": "https://www.eaton.com/cybersecurity"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eEaton\u2019s Cooper Power Systems division has developed ProView 5.0 \nRevision 11 software that mitigates this vulnerability, and the Form 6 \ncontrol version was released on June 12, 2015. Idea/IdeaPLUS relay \nProView software versions began to be posted on June 30, 2015. \nProView 5.0 Revision 11 will be compatible with any hardware and \nfirmware Versions 5.0 and higher. Versions below 5.0 may be updated with\n the appropriate and corresponding hardware upgrades. Information on how\n to obtain and install these available remedies is available at:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.cooperindustries.com/content/public/en/power_systems/resources/securitysupport.html\"\u003ehttp://www.cooperindustries.com/content/public/en/power_systems/resources/securitysupport.html\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eFor additional technical information, please contact Eaton\u2019s Cooper Power Systems at:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.eaton.com/cybersecurity\"\u003ehttps://www.eaton.com/cybersecurity\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "Eaton\u2019s Cooper Power Systems division has developed ProView 5.0 \nRevision 11 software that mitigates this vulnerability, and the Form 6 \ncontrol version was released on June 12, 2015. Idea/IdeaPLUS relay \nProView software versions began to be posted on June 30, 2015. \nProView 5.0 Revision 11 will be compatible with any hardware and \nfirmware Versions 5.0 and higher. Versions below 5.0 may be updated with\n the appropriate and corresponding hardware upgrades. Information on how\n to obtain and install these available remedies is available at:\n\n\n http://www.cooperindustries.com/content/public/en/power_systems/resources/securitysupport.html \n\n\nFor additional technical information, please contact Eaton\u2019s Cooper Power Systems at:\n\n\n https://www.eaton.com/cybersecurity"
}
],
"source": {
"advisory": "ICSA-15-006-01",
"discovery": "EXTERNAL"
},
"title": "Eaton\u2019s Cooper Power Series Form 6 Control and Idea/IdeaPlus Relays with Ethernet",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo authentication mechanism was used for new socket connections to \nSCADA protocol listening ports on the Form 6 control and Idea/IdeaPLUS \nrelays. The effects of exploiting this vulnerability are the same as the\n effects of an attacker connecting directly to the control or network \nand listening for or initiating a new session, without exploiting any \nvulnerabilities. This underscores the importance of deploying network \nsegmentation and isolation on the control system network. By ensuring \nthat controls are not accessible from external networks and that \nappropriate physical security measures are provided at network access \npoints, risks associated with this vulnerability are greatly minimized.\u003c/p\u003e\n\u003cp\u003eEaton\u2019s Cooper Power Systems recommends that asset owners using these\n products take the proper steps to ensure system wide defense-in-depth \nstrategies, as outlined in Eaton\u2019s whitepaper WP152002EN. This \nwhitepaper can be downloaded at:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.eaton.com/content/dam/eaton/products/industrialcontrols-drives-automation-sensors/c441-motor-insight-motor-protection-relays/cyber-security-white-paper-wp152002en.pdf\"\u003ehttps://www.eaton.com/content/dam/eaton/products/industrialcontrols-drives-automation-sensors/c441-motor-insight-motor-protection-relays/cyber-security-white-paper-wp152002en.pdf\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "No authentication mechanism was used for new socket connections to \nSCADA protocol listening ports on the Form 6 control and Idea/IdeaPLUS \nrelays. The effects of exploiting this vulnerability are the same as the\n effects of an attacker connecting directly to the control or network \nand listening for or initiating a new session, without exploiting any \nvulnerabilities. This underscores the importance of deploying network \nsegmentation and isolation on the control system network. By ensuring \nthat controls are not accessible from external networks and that \nappropriate physical security measures are provided at network access \npoints, risks associated with this vulnerability are greatly minimized.\n\n\nEaton\u2019s Cooper Power Systems recommends that asset owners using these\n products take the proper steps to ensure system wide defense-in-depth \nstrategies, as outlined in Eaton\u2019s whitepaper WP152002EN. This \nwhitepaper can be downloaded at:\n\n\n https://www.eaton.com/content/dam/eaton/products/industrialcontrols-drives-automation-sensors/c441-motor-insight-motor-protection-relays/cyber-security-white-paper-wp152002en.pdf"
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-9196",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "75936",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75936"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-006-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-006-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2014-9196",
"datePublished": "2015-07-20T01:00:00",
"dateReserved": "2014-12-02T00:00:00",
"dateUpdated": "2025-09-05T21:11:15.864Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-16226 (GCVE-0-2020-16226)
Vulnerability from cvelistv5 – Published: 2020-10-05 17:19 – Updated: 2024-09-17 00:25
VLAI?
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
Severity ?
No CVSS data available.
CWE
- CWE-342 - PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mitsubishi Electric | QJ71MES96 |
Affected:
all versions
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:37:54.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "QJ71MES96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71WS96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q06CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-VG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "R12CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD55UP06-V,",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "D55UP12-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71GN11-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71EN71",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71MT91",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78Gn(n=4,8,16,32,64)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHV",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHW",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-60",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-300",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-MT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-EIP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q03UDECPU",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDVCPU(n=03/04/06/13/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "QnUDPVCPU(n=04/06/13/2)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "LnCPU(-P)(n=02/06/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "L26CPU-(P)BT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "RnCPU(n=00/01/02)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 18 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnENCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnSFCPU (n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPSFCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5U(C)-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Serial number 17X**** or later: Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "Serial number 179**** and prior: Version 1.070 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UC-32M*/**-TS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UJ-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Version 1.000"
}
]
},
{
"product": "FX5-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-ENET/IP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-ADP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3GE-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-P502",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-CCLGN-MS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "IU1-1M20-D",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LE7-40GU-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT2000 Series GT21 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GS Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT1000 Series GT14 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GT25-J71GN13-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-F800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A8NCG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date August 2020 and prior"
}
]
},
{
"product": "FR-E800-EPA Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "FR-E800-EPB Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "Conveyor Tracking Application",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "APR-nTR3FH all versions"
},
{
"status": "affected",
"version": "APR-nTR6FH all versions"
},
{
"status": "affected",
"version": "APR-nTR12FH all versions"
},
{
"status": "affected",
"version": "APR-nTR20FH(n=1,2) all versions"
}
]
},
{
"product": "MR-JE-C",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "MR-J4-TM",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
],
"datePublic": "2020-09-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-05T17:19:17",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
},
"title": "Mitsubishi Electric Multiple Products",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2020-09-01T16:00:00.000Z",
"ID": "CVE-2020-16226",
"STATE": "PUBLIC",
"TITLE": "Mitsubishi Electric Multiple Products"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QJ71MES96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71WS96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q06CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-VG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "R12CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD55UP06-V,",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "D55UP12-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71GN11-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71EN71",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71MT91",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78Gn(n=4,8,16,32,64)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHV",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHW",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-60",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-300",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-MT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q03UDECPU",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDVCPU(n=03/04/06/13/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "QnUDPVCPU(n=04/06/13/2)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "LnCPU(-P)(n=02/06/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "L26CPU-(P)BT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=00/01/02)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 18 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnENCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnSFCPU (n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPSFCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5U(C)-**M*/**",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Serial number 17X**** or later: Version 1.210 and prior"
},
{
"version_affected": "\u003c",
"version_value": "Serial number 179**** and prior: Version 1.070 and prior"
}
]
}
},
{
"product_name": "FX5UC-32M*/**-TS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 1.210 and prior"
}
]
}
},
{
"product_name": "FX5UJ-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Version 1.000"
}
]
}
},
{
"product_name": "FX5-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-ENET/IP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-ADP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3GE-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-P502",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-CCLGN-MS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "IU1-1M20-D",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LE7-40GU-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT2000 Series GT21 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GS Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT1000 Series GT14 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GT25-J71GN13-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-F800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A8NCG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date August 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPA Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPB Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "Conveyor Tracking Application",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "APR-nTR3FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR6FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR12FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR20FH(n=1,2)",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-JE-C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-J4-TM",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
]
},
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-16226",
"datePublished": "2020-10-05T17:19:17.358565Z",
"dateReserved": "2020-07-31T00:00:00",
"dateUpdated": "2024-09-17T00:25:38.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-28388 (GCVE-0-2020-28388)
Vulnerability from cvelistv5 – Published: 2021-02-09 00:00 – Updated: 2024-08-04 16:33
VLAI?
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus ReadyStart V3 (All versions < V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones.
Severity ?
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Siemens | APOGEE PXC Compact (BACnet) |
Affected:
All versions < V3.5.5
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:33:58.999Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436469.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "APOGEE PXC Compact (BACnet)",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V3.5.5"
}
]
},
{
"defaultStatus": "unknown",
"product": "APOGEE PXC Compact (P2 Ethernet)",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V2.8.20"
}
]
},
{
"defaultStatus": "unknown",
"product": "APOGEE PXC Modular (BACnet)",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V3.5.5"
}
]
},
{
"defaultStatus": "unknown",
"product": "APOGEE PXC Modular (P2 Ethernet)",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V2.8.20"
}
]
},
{
"defaultStatus": "unknown",
"product": "Nucleus NET",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V5.2"
}
]
},
{
"defaultStatus": "unknown",
"product": "Nucleus ReadyStart V3",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V2012.12"
}
]
},
{
"defaultStatus": "unknown",
"product": "Nucleus Source Code",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions"
}
]
},
{
"defaultStatus": "unknown",
"product": "PLUSCONTROL 1st Gen",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions"
}
]
},
{
"defaultStatus": "unknown",
"product": "TALON TC Compact (BACnet)",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V3.5.5"
}
]
},
{
"defaultStatus": "unknown",
"product": "TALON TC Modular (BACnet)",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V3.5.5"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions \u003c V5.2), Nucleus ReadyStart V3 (All versions \u003c V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "CWE-342: Predictable Exact Value from Previous Values",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-08T09:20:06.562Z",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436469.pdf"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2020-28388",
"datePublished": "2021-02-09T00:00:00",
"dateReserved": "2020-11-10T00:00:00",
"dateUpdated": "2024-08-04T16:33:58.999Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-27577 (GCVE-0-2022-27577)
Vulnerability from cvelistv5 – Published: 2022-04-11 19:37 – Updated: 2024-08-03 05:32
VLAI?
Summary
The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | SICK MSC800 |
Affected:
All versions before 4.15
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T05:32:59.251Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sick.com/psirt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SICK MSC800",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "All versions before 4.15"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "CWE-342",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-11T19:37:47",
"orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988",
"shortName": "SICK AG"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sick.com/psirt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@sick.de",
"ID": "CVE-2022-27577",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SICK MSC800",
"version": {
"version_data": [
{
"version_value": "All versions before 4.15"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-342"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sick.com/psirt",
"refsource": "MISC",
"url": "https://sick.com/psirt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988",
"assignerShortName": "SICK AG",
"cveId": "CVE-2022-27577",
"datePublished": "2022-04-11T19:37:47",
"dateReserved": "2022-03-21T00:00:00",
"dateUpdated": "2024-08-03T05:32:59.251Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-29930 (GCVE-0-2022-29930)
Vulnerability from cvelistv5 – Published: 2022-05-12 08:35 – Updated: 2024-08-03 06:33
VLAI?
Summary
SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1.
Severity ?
8.7 (High)
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:33:43.149Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/ktorio/ktor/pull/2966"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Ktor",
"vendor": "JetBrains",
"versions": [
{
"status": "affected",
"version": "2.0.0"
},
{
"lessThan": "2.0.1",
"status": "affected",
"version": "2.0.1",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "CWE-342: Predictable Exact Value from Previous Values",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-06-24T10:55:09",
"orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014",
"shortName": "JetBrains"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/ktorio/ktor/pull/2966"
}
],
"source": {
"defect": [
"KTOR-4217"
],
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@jetbrains.com",
"ID": "CVE-2022-29930",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ktor",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "2.0.0",
"version_value": "2.0.0"
},
{
"version_affected": "\u003c",
"version_name": "2.0.1",
"version_value": "2.0.1"
}
]
}
}
]
},
"vendor_name": "JetBrains"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-342: Predictable Exact Value from Previous Values"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"refsource": "MISC",
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/"
},
{
"name": "https://github.com/ktorio/ktor/pull/2966",
"refsource": "MISC",
"url": "https://github.com/ktorio/ktor/pull/2966"
}
]
},
"source": {
"defect": [
"KTOR-4217"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014",
"assignerShortName": "JetBrains",
"cveId": "CVE-2022-29930",
"datePublished": "2022-05-12T08:35:17",
"dateReserved": "2022-04-29T00:00:00",
"dateUpdated": "2024-08-03T06:33:43.149Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-3373 (GCVE-0-2023-3373)
Vulnerability from cvelistv5 – Published: 2023-08-03 23:44 – Updated: 2025-02-27 21:11
VLAI?
Summary
Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it.
Severity ?
5.9 (Medium)
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mitsubishi Electric Corporation | GOT2000 Series GT21 model |
Affected:
01.49.000 and prior
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:55:03.371Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/vu/JVNVU92167394/index.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-3373",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-26T21:51:02.316826Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-27T21:11:06.051Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "GOT2000 Series GT21 model",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "01.49.000 and prior"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GOT SIMPLE Series GS21 model",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "01.49.000 and prior"
}
]
}
],
"datePublic": "2023-08-03T03:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it."
}
],
"value": "Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "CWE-342 Predictable Exact Value from Previous Values",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-03T23:44:40.341Z",
"orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad",
"shortName": "Mitsubishi"
},
"references": [
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf"
},
{
"url": "https://jvn.jp/vu/JVNVU92167394/index.html"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad",
"assignerShortName": "Mitsubishi",
"cveId": "CVE-2023-3373",
"datePublished": "2023-08-03T23:44:40.341Z",
"dateReserved": "2023-06-23T01:32:29.994Z",
"dateUpdated": "2025-02-27T21:11:06.051Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Mitigation
Phases:
Description:
- Increase the entropy used to seed a PRNG.
Mitigation ID: MIT-2
Phases: Architecture and Design, Requirements
Strategy: Libraries or Frameworks
Description:
- Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
Mitigation ID: MIT-50
Phase: Implementation
Description:
- Use a PRNG that periodically re-seeds itself using input from high-quality sources, such as hardware devices with high entropy. However, do not re-seed too frequently, or else the entropy source might block.
No CAPEC attack patterns related to this CWE.