All the vulnerabilites related to Mitsubishi Electric Corporation - MELSEC iQ-R series Safety CPU R16SFCPU
cve-2021-20599
Vulnerability from cvelistv5
Published
2021-10-14 00:00
Modified
2024-08-03 17:45
Severity ?
EPSS score ?
Summary
Cleartext Transmission of Sensitive InformationCleartext transmission of sensitive information vulnerability in MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU firmware versions "26" and prior and MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to login to a target CPU module by obtaining credentials other than password.
References
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-011_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU98578731 | government-resource | |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-287-03 | government-resource |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:mitsubishielectric:melsec_iq-r08sfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "melsec_iq-r08sfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r16sfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r32sfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r120sfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r08psfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r16psfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r32psfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] }, { "cpes": [ "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r120psfcpu", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "-" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2021-20599", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T20:51:10.357119Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:12:41.515Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:44.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-011_en.pdf" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU98578731" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-287-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series Safety CPU R08SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"26\" and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R series Safety CPU R16SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"26\" and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R series Safety CPU R32SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"26\" and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R series Safety CPU R120SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"26\" and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series SIL2 Process CPU R08PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"11\" and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R series SIL2 Process CPU R16PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"11\" and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R series SIL2 Process CPU R32PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"11\" and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R series SIL2 Process CPU R120PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware versions \"11\" and prior" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cleartext Transmission of Sensitive InformationCleartext transmission of sensitive information vulnerability in MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU firmware versions \"26\" and prior and MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU firmware versions \"11\" and prior allows a remote unauthenticated attacker to login to a target CPU module by obtaining credentials other than password." } ], "value": "Cleartext Transmission of Sensitive InformationCleartext transmission of sensitive information vulnerability in MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU firmware versions \"26\" and prior and MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU firmware versions \"11\" and prior allows a remote unauthenticated attacker to login to a target CPU module by obtaining credentials other than password." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319 Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-18T05:28:04.068Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-011_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU98578731" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-287-03" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2021-20599", "datePublished": "2021-10-14T00:00:00", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:45:44.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6815
Vulnerability from cvelistv5
Published
2024-02-13 06:27
Modified
2024-08-02 08:42
Severity ?
EPSS score ?
Summary
Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series Safety CPU R08/16/32/120SFCPU all versions and MELSEC iQ-R Series SIL2 Process CPU R08/16/32/120PSFCPU all versions allows a remote authenticated attacker who has logged into the product as a non-administrator user to disclose the credentials (user ID and password) of a user with a lower access level than the attacker by sending a specially crafted packet.
References
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-021_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU95085830/index.html | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-044-01 | government-resource |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-6815", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-13T16:44:26.588675Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:17:01.365Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-021_en.pdf" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95085830/index.html" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-044-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series Safety CPU R08SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series Safety CPU R16SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series Safety CPU R32SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series Safety CPU R120SFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series SIL2 Process CPU R08PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series SIL2 Process CPU R16PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series SIL2 Process CPU R32PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series SIL2 Process CPU R120PSFCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series Safety CPU R08/16/32/120SFCPU all versions and MELSEC iQ-R Series SIL2 Process CPU R08/16/32/120PSFCPU all versions allows a remote authenticated attacker who has logged into the product as a non-administrator user to disclose the credentials (user ID and password) of a user with a lower access level than the attacker by sending a specially crafted packet." } ], "value": "Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series Safety CPU R08/16/32/120SFCPU all versions and MELSEC iQ-R Series SIL2 Process CPU R08/16/32/120PSFCPU all versions allows a remote authenticated attacker who has logged into the product as a non-administrator user to disclose the credentials (user ID and password) of a user with a lower access level than the attacker by sending a specially crafted packet." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Information Disclosure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266 Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-14T03:59:42.705Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-021_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU95085830/index.html" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-044-01" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2023-6815", "datePublished": "2024-02-13T06:27:51.202Z", "dateReserved": "2023-12-14T02:59:09.887Z", "dateUpdated": "2024-08-02T08:42:07.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }