Vulnerabilites related to mitsubishielectric - q06udvcpu
cve-2019-6535
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106771 | vdb-entry, x_refsource_BID | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | ICS-CERT | Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. |
Version: Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T20:23:21.974Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106771", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106771", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior.", vendor: "ICS-CERT", versions: [ { status: "affected", version: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior.", }, ], }, ], datePublic: "2019-01-29T00:00:00", descriptions: [ { lang: "en", value: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION') CWE-400", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-02-06T10:57:02", orgId: "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", shortName: "icscert", }, references: [ { name: "106771", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106771", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "ics-cert@hq.dhs.gov", DATE_PUBLIC: "2019-01-29T00:00:00", ID: "CVE-2019-6535", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior.", version: { version_data: [ { version_value: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior.", }, ], }, }, ], }, vendor_name: "ICS-CERT", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION') CWE-400", }, ], }, ], }, references: { reference_data: [ { name: "106771", refsource: "BID", url: "http://www.securityfocus.com/bid/106771", }, { name: "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", assignerShortName: "icscert", cveId: "CVE-2019-6535", datePublished: "2019-02-05T19:00:00Z", dateReserved: "2019-01-22T00:00:00", dateUpdated: "2024-09-16T21:08:31.745Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-24946
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU90895626/index.html | x_refsource_MISC | |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V; Mitsubishi Electric MELSEC-Q Series Q03UDECPU; Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V; Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G); Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS; Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC-L series L26CPU-(P)BT; Mitsubishi Electric MELIPC Series MI5122-VW |
Version: Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions "16" and prior Version: Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. "24061" and prior Version: Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. "24061" and prior Version: Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions Version: Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions Version: Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions Version: Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELIPC Series MI5122-VW firmware versions "05" and prior |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:29:01.628Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jvn.jp/vu/JVNVU90895626/index.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V; Mitsubishi Electric MELSEC-Q Series Q03UDECPU; Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V; Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G); Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS; Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC-L series L26CPU-(P)BT; Mitsubishi Electric MELIPC Series MI5122-VW", vendor: "n/a", versions: [ { status: "affected", version: "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior", }, { status: "affected", version: "Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior", }, { status: "affected", version: "Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior", }, { status: "affected", version: "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior", }, { status: "affected", version: "Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior", }, { status: "affected", version: "Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions", }, { status: "affected", version: "Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions", }, { status: "affected", version: "Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions", }, { status: "affected", version: "Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior", }, { status: "affected", version: "Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior", }, { status: "affected", version: "Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior", }, ], }, ], descriptions: [ { lang: "en", value: "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery.", }, ], problemTypes: [ { descriptions: [ { description: "Improper Resource Locking", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-19T22:41:30", orgId: "e0f77b61-78fd-4786-b3fb-1ee347a748ad", shortName: "Mitsubishi", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://jvn.jp/vu/JVNVU90895626/index.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", ID: "CVE-2022-24946", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V; Mitsubishi Electric MELSEC-Q Series Q03UDECPU; Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V; Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G); Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS; Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC-L series L26CPU-(P)BT; Mitsubishi Electric MELIPC Series MI5122-VW", version: { version_data: [ { version_value: "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior", }, { version_value: "Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior", }, { version_value: "Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior", }, { version_value: "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior", }, { version_value: "Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior", }, { version_value: "Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions", }, { version_value: "Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions", }, { version_value: "Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions", }, { version_value: "Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior", }, { version_value: "Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior", }, { version_value: "Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Improper Resource Locking", }, ], }, ], }, references: { reference_data: [ { name: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", refsource: "MISC", url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", }, { name: "https://jvn.jp/vu/JVNVU90895626/index.html", refsource: "MISC", url: "https://jvn.jp/vu/JVNVU90895626/index.html", }, { name: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", refsource: "MISC", url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "e0f77b61-78fd-4786-b3fb-1ee347a748ad", assignerShortName: "Mitsubishi", cveId: "CVE-2022-24946", datePublished: "2022-06-15T20:18:35", dateReserved: "2022-02-10T00:00:00", dateUpdated: "2024-08-03T04:29:01.628Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "831CD80D-C812-403D-BC2E-7721936610D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", matchCriteriaId: "946DA26E-A6B2-46F6-BA81-A92133124823", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q04udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34F39554-77CE-4D87-A6A3-0AF4FFFC1C2B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q04udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "82399072-1B4D-46A4-A37C-FC706915B162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q04udpvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "413D7F26-E1A1-4930-A91C-144BEB81E93B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q04udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "D6EF53BB-1A67-4677-871A-CB73A7C58D42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q04udvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "532F62A7-F9C9-4662-83EC-1DC8D3F1D180", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q04udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "96E8978F-B03D-4B1F-ABBA-D817E614286C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q100udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5D6CDCC0-5F21-4473-8056-010CA834294E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q100udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "6E58A172-EEAF-4211-9F3A-66CF57456AFB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q50udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4C2420E8-00B2-4A77-B066-C56C584D79EF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q50udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "401FB06F-F2F8-4C1E-B36B-4E3E4007F772", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q26dhccpu-ls_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "99135DCE-0336-45B4-A04A-30EB50A6F96C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q26dhccpu-ls:-:*:*:*:*:*:*:*", matchCriteriaId: "D3A79557-71AA-466E-9E1E-EEE00B54386A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q26udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "270C6407-C62B-4C1F-BB26-FB8B4B5ACACA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q26udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "795ED888-B01E-4EBA-8FB5-42D196169761", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q26udpvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5A0DC211-8C25-414B-A0DB-BD0AE23E5C7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q26udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "D392BED4-C8A7-4A66-8A59-E2B569696E79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q26udvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1BA33FB8-3972-48B9-BED6-4AE8B3BF1636", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q26udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "B48AD3F4-81A2-43D2-A8B6-F7630CF4E742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q20udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1391E89B-9EF1-4AC1-A584-60580D354F6F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q20udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "1696B87B-AF68-4341-9E13-E2B25FEA623A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q13udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "62B710AC-076E-43F0-98C5-E3910113769D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q13udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "DD3ACF11-7E9F-45A0-B4C2-B804B3609791", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q13udpvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5590E663-6C0D-4B73-AADB-6275B45A0D5D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q13udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "661C0146-FCCC-45BE-9EF6-113BD227E546", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q13udvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2B28F75E-64F0-4F8F-8C41-33AFC623BB4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q13udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "97BCF977-E6AE-443E-8348-F7E13830BC23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q10udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B1788914-0097-425E-BA6E-4312C418F423", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q10udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "E92D0D5D-E6A0-4E5D-83D9-6653E816FEF5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06ccpu-v_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3FFA9E2E-5269-431E-8BF2-311064CEC289", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06ccpu-v:-:*:*:*:*:*:*:*", matchCriteriaId: "E517BA2F-CF39-49C2-A68E-64A2CE17DBDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06phcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "02BE0617-11A9-45E8-A08B-C07ED0F13FC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06phcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "209C8EA9-FCF9-4328-ABFC-39E9AD3DED33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06udehcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "799930EB-89C4-4CA9-B4FD-4B2D7887E127", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "210FBF45-F646-4179-8139-E9022EA2E9AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06udpvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "84E904FE-59D9-4D6F-9962-A6D8EF0678EF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "052E37E0-9D05-4EB6-ADB3-B4465A19DC0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06udvcpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE7BC1E-1330-4DDF-8114-2B7BAD5839D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "CC119CA6-BFF3-4CFE-95E5-A10EEE52347F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l02cpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "94E9318C-B3FA-43A5-8509-285FD1968D6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l02cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "125482D3-8FA3-4E80-BE4D-29C3C721C624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l02cpu-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1B0BC24-11B5-4174-8877-966FE4ED959D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l02cpu-p:-:*:*:*:*:*:*:*", matchCriteriaId: "ECC3E9C7-04C0-43F1-99B2-0C2471238A13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l02scpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "739910FB-4D30-4E48-823A-778390DC7691", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l02scpu:-:*:*:*:*:*:*:*", matchCriteriaId: "EC87459F-DB5E-4A5F-BFFC-B2026405F74B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l02scpu-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5A0F2373-BC92-42D8-A076-92B6AC32B3AC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l02scpu-p:-:*:*:*:*:*:*:*", matchCriteriaId: "61414DA7-87A6-421E-B75D-5D4283B54C41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l06cpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B804C2-CF55-42C5-BBE2-2035C1FAEF58", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l06cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "63C8CF5F-FFDF-4403-96D0-46A7FECAC5E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l06cpu-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23DAE700-6C44-4DB6-83F0-1FC4C687B8F5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l06cpu-p:-:*:*:*:*:*:*:*", matchCriteriaId: "961B56BC-F78C-44CC-885E-3451DFDF29EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l26cpu_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1BC66-A107-4ADA-B0EE-82C71CFEC105", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l26cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "1884BE8D-FFCD-4089-9F0B-519C8F570FCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l26cpu-\\(p\\)bt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D36C5DC5-6A0E-41A1-A24F-CE53ADEED427", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l26cpu-\\(p\\)bt:-:*:*:*:*:*:*:*", matchCriteriaId: "CE019E69-01F5-4AC8-BE72-48A7B0FD0C56", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l26cpu-bt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15080C41-2C1F-46E8-920A-EDAE23E6CCB1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l26cpu-bt:-:*:*:*:*:*:*:*", matchCriteriaId: "3966C103-5181-49E3-878F-A0AF9F1DBA76", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l26cpu-bt-cm_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C758984-3178-4316-8E0C-3F4BB2CE598E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l26cpu-bt-cm:-:*:*:*:*:*:*:*", matchCriteriaId: "553A2CEB-5528-4A9E-800E-D91E5A3C49AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l26cpu-p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "361DEFFD-40FD-4B5F-ACFC-A62C165D4072", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l26cpu-p:-:*:*:*:*:*:*:*", matchCriteriaId: "FFD2A6CD-32DE-49F0-89F4-C130F0809766", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:l26cpu-pbt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3C588A-1BFF-47B5-A658-EAF93F437E8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:l26cpu-pbt:-:*:*:*:*:*:*:*", matchCriteriaId: "A60BE93D-B60D-4F45-ACD3-7B64C0C45D83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery.", }, { lang: "es", value: "Una vulnerabilidad de bloqueo de recursos inapropiado en las versiones de firmware \"16\" y anteriores de Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V, Mitsubishi Electric MELSEC-Q Series Q03UDECPU los primeros 5 dígitos del número de serie \"24061\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU los primeros 5 dígitos del número de serie \"24061\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU los 5 primeros dígitos del número de serie \"24051\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU los 5 primeros dígitos del número de serie \"24051\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V todas las versiones, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) todas las versiones, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS todas las versiones, Mitsubishi Electric MELSEC-L serie L02/06/26CPU(-P) los primeros 5 dígitos del número de serie \"24051\" y anteriores, Mitsubishi Electric MELSEC-L serie L26CPU-(P)BT los primeros 5 dígitos del número de serie \"24051\" y anteriores y Mitsubishi Electric MELIPC serie MI5122-VW versiones de firmware \"05\" y anteriores permiten que un atacante remoto no autenticado provoque una condición de denegación de servicio (DoS) en las comunicaciones Ethernet mediante el envío de paquetes especialmente diseñados. Es requerido un reinicio del sistema de los productos para la recuperación.", }, ], id: "CVE-2022-24946", lastModified: "2024-11-21T06:51:26.130", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-06-15T21:15:09.333", references: [ { source: "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", tags: [ "Third Party Advisory", ], url: "https://jvn.jp/vu/JVNVU90895626/index.html", }, { source: "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", }, { source: "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", tags: [ "Vendor Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://jvn.jp/vu/JVNVU90895626/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", }, ], sourceIdentifier: "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-667", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106771 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106771 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02 | Third Party Advisory, US Government Resource |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q03udvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3F6589C-3572-42CC-B880-5B2C3549474C", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q03udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "0084E961-8F69-4EFE-A40E-1CF9A06453E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q04udvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87073025-987A-4BEF-964E-883C8E7756DA", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q04udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "96E8978F-B03D-4B1F-ABBA-D817E614286C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06udvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE0FDFA3-0ED9-4021-8D72-C4F69B6B3459", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "CC119CA6-BFF3-4CFE-95E5-A10EEE52347F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q13udvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "28EC5DB9-D294-4B47-80A8-DD22150A95B4", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q13udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "97BCF977-E6AE-443E-8348-F7E13830BC23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q26udvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "689E8111-2B67-4032-8B63-668FF0EDEDFD", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q26udvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "B48AD3F4-81A2-43D2-A8B6-F7630CF4E742", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q04udpvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AE674A26-ADB7-46F1-8732-E349B36FB19D", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q04udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "D6EF53BB-1A67-4677-871A-CB73A7C58D42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06udpvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "15597B31-88EF-46AC-8FED-C3F0FD2D7BB7", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "052E37E0-9D05-4EB6-ADB3-B4465A19DC0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q13udpvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9BC22445-3EF3-4C25-8D0D-9168D24BA6E3", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q13udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "661C0146-FCCC-45BE-9EF6-113BD227E546", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q26udpvcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C6DEC53B-5BCF-463B-A9B2-33E8BDE6E62C", versionEndIncluding: "20081", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q26udpvcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "D392BED4-C8A7-4A66-8A59-E2B569696E79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0F243D37-4DEB-4417-B293-A744752A21CB", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", matchCriteriaId: "946DA26E-A6B2-46F6-BA81-A92133124823", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q04udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B073F2B0-FBED-4D2D-B162-E3AF4BAFE2AD", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q04udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "82399072-1B4D-46A4-A37C-FC706915B162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q06udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "405F5551-5878-4EC2-98F2-2C8738367CBB", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q06udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "210FBF45-F646-4179-8139-E9022EA2E9AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q10udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30FA774C-8EA6-4276-AE24-DC77C9759D3B", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q10udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "E92D0D5D-E6A0-4E5D-83D9-6653E816FEF5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q13udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDA2969A-877C-44DF-8493-38F573D5F866", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q13udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "DD3ACF11-7E9F-45A0-B4C2-B804B3609791", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q20udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D93EF2BD-FDFB-4475-9E4F-73235AE5FF24", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q20udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "1696B87B-AF68-4341-9E13-E2B25FEA623A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q26udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "432285C7-DD4C-4C7F-AF98-3ED9D3F68185", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q26udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "795ED888-B01E-4EBA-8FB5-42D196169761", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q50udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7844E75B-B110-4BD6-A01B-8A71317604D0", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q50udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "401FB06F-F2F8-4C1E-B36B-4E3E4007F772", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mitsubishielectric:q100udehcpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "943C4F6E-AE15-4CB1-A4DE-E94E5FCFFB71", versionEndIncluding: "20101", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mitsubishielectric:q100udehcpu:-:*:*:*:*:*:*:*", matchCriteriaId: "6E58A172-EEAF-4211-9F3A-66CF57456AFB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash.", }, { lang: "es", value: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: número de serie 20081 y anteriores, Q04/06/13/26UDPVCPU: número de serie 20081 y anteriores y Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: número de serie 20101 y anteriores. Un atacante remoto puede mandar bites específicos a través del puerto 5007 que resultará en un cierre inesperado de la pila de ethernet.", }, ], id: "CVE-2019-6535", lastModified: "2024-11-21T04:46:38.847", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T19:29:00.243", references: [ { source: "ics-cert@hq.dhs.gov", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106771", }, { source: "ics-cert@hq.dhs.gov", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106771", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", }, ], sourceIdentifier: "ics-cert@hq.dhs.gov", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "ics-cert@hq.dhs.gov", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
var-202206-1251
Vulnerability from variot
Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions "16" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number "24051" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions "05" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.When the product receives a packet crafted by a remote third party, the product Ethernet Communication function interferes with service operation ( DoS ) May be in a state. In addition, service operation interruption ( DoS ) It is necessary to reset the product to recover from the state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-1251", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "q13udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q04udvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l26cpu-\\ bt", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q13udpvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q06ccpu-v", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q26udvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l02cpu-p", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l02scpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q06udvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l26cpu-bt", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q04udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q50udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q26udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l26cpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l02scpu-p", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q06phcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l26cpu-bt-cm", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q20udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q06udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l02cpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l06cpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q04udpvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l26cpu-p", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q100udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l26cpu-pbt", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q26dhccpu-ls", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q03udecpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q26udpvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q13udvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q06udpvcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "q10udehcpu", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "l06cpu-p", scope: "eq", trust: 1, vendor: "mitsubishielectric", version: null, }, { model: "melsec iq-r シリーズ", scope: null, trust: 0.8, vendor: "三菱電機", version: null, }, { model: "melsec q シリーズ", scope: null, trust: 0.8, vendor: "三菱電機", version: null, }, { model: "melipc シリーズ", scope: null, trust: 0.8, vendor: "三菱電機", version: null, }, { model: "melsec l シリーズ", scope: null, trust: 0.8, vendor: "三菱電機", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "NVD", id: "CVE-2022-24946", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q04udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q04udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q04udpvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q04udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q04udvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q04udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q100udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q100udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q50udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q50udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q26dhccpu-ls_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q26dhccpu-ls:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q26udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q26udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q26udpvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q26udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q26udvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q26udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q20udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q20udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q13udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q13udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q13udpvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q13udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q13udvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q13udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q10udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q10udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06ccpu-v_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06ccpu-v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06phcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06phcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06udehcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06udpvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06udvcpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l02cpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l02cpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l02cpu-p_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l02cpu-p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l02scpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l02scpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l02scpu-p_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l02scpu-p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l06cpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l06cpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l06cpu-p_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l06cpu-p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l26cpu_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l26cpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l26cpu-\\(p\\)bt_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l26cpu-\\(p\\)bt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l26cpu-bt_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l26cpu-bt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l26cpu-bt-cm_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l26cpu-bt-cm:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l26cpu-p_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l26cpu-p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:l26cpu-pbt_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:l26cpu-pbt:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-24946", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Mitsubishi Electric reported this vulnerability to CISA.", sources: [ { db: "CNNVD", id: "CNNVD-202206-1550", }, ], trust: 0.6, }, cve: "CVE-2022-24946", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 6.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 7.8, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2022-24946", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "High", attackVector: "Network", author: "OTHER", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "JVNDB-2022-001954", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Changed", trust: 0.8, userInteraction: "Required", vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2022-24946", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202206-1550", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2022-24946", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2022-24946", }, { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "CNNVD", id: "CNNVD-202206-1550", }, { db: "NVD", id: "CVE-2022-24946", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.When the product receives a packet crafted by a remote third party, the product Ethernet Communication function interferes with service operation ( DoS ) May be in a state. In addition, service operation interruption ( DoS ) It is necessary to reset the product to recover from the state", sources: [ { db: "NVD", id: "CVE-2022-24946", }, { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "VULMON", id: "CVE-2022-24946", }, ], trust: 1.71, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-24946", trust: 3.3, }, { db: "JVN", id: "JVNVU90895626", trust: 2.5, }, { db: "ICS CERT", id: "ICSA-22-172-01", trust: 2.5, }, { db: "JVNDB", id: "JVNDB-2022-001954", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202206-1550", trust: 0.6, }, { db: "VULMON", id: "CVE-2022-24946", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2022-24946", }, { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "CNNVD", id: "CNNVD-202206-1550", }, { db: "NVD", id: "CVE-2022-24946", }, ], }, id: "VAR-202206-1251", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.75, }, last_update_date: "2024-06-02T22:52:44.849000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "MELSEC and MELIPC Of the series Ethernet Denial of service on port (DoS) Vulnerability", trust: 0.8, url: "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-007.pdf", }, { title: "Mitsubishi Electric MELSEC-Q Series Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196987", }, { title: "", trust: 0.1, url: "https://github.com/live-hack-cve/cve-2022-24946 ", }, ], sources: [ { db: "VULMON", id: "CVE-2022-24946", }, { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "CNNVD", id: "CNNVD-202206-1550", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-667", trust: 1, }, { problemtype: "Inappropriate resource lock (CWE-413) [ others ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "NVD", id: "CVE-2022-24946", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.6, url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", }, { trust: 2.5, url: "https://jvn.jp/vu/jvnvu90895626/index.html", }, { trust: 1.7, url: "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2022-24946", }, { trust: 0.6, url: "https://jvn.jp/vu/jvnvu#90895626/index.html", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-24946/", }, { trust: 0.6, url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-172-01", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/667.html", }, { trust: 0.1, url: "https://github.com/live-hack-cve/cve-2022-24946", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2022-24946", }, { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "CNNVD", id: "CNNVD-202206-1550", }, { db: "NVD", id: "CVE-2022-24946", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2022-24946", }, { db: "JVNDB", id: "JVNDB-2022-001954", }, { db: "CNNVD", id: "CNNVD-202206-1550", }, { db: "NVD", id: "CVE-2022-24946", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-06-15T00:00:00", db: "VULMON", id: "CVE-2022-24946", }, { date: "2022-06-15T00:00:00", db: "JVNDB", id: "JVNDB-2022-001954", }, { date: "2022-06-15T00:00:00", db: "CNNVD", id: "CNNVD-202206-1550", }, { date: "2022-06-15T21:15:09.333000", db: "NVD", id: "CVE-2022-24946", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-08-19T00:00:00", db: "VULMON", id: "CVE-2022-24946", }, { date: "2024-05-31T03:20:00", db: "JVNDB", id: "JVNDB-2022-001954", }, { date: "2022-08-22T00:00:00", db: "CNNVD", id: "CNNVD-202206-1550", }, { date: "2022-08-19T23:25:31.040000", db: "NVD", id: "CVE-2022-24946", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202206-1550", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Made by Mitsubishi Electric MELSEC and MELIPC Improper resource lock vulnerability in series", sources: [ { db: "JVNDB", id: "JVNDB-2022-001954", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202206-1550", }, ], trust: 0.6, }, }
var-201902-0127
Vulnerability from variot
Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash. plural Mitsubishi Electric Q Series products are vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Mitsubishi Electric MELSEC-Q Series PLCs are prone to an remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Misubishi Electric Q03UDVCPU, etc. are all PLC (programmable logic controller) products of Japan's Mitsubishi Electric (Misubishi Electric) company. Security flaws exist in several Misubishi products. A remote attacker could exploit this vulnerability by sending a specially crafted packet to cause Ethernet to stop communicating. The following products are affected: Misubishi Q03UDVCPU; Q04UDVCPU; Q06UDVCPU; Q13UDVCPU; Q26UDPVCPU; Q03UDECPU;
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0127", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "q06udvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q04udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q10udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q50udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q26udpvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q03udvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q26udvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q03udecpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q06udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q13udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q20udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q26udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q100udehcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20101", }, { model: "q06udpvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q13udvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q04udpvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q04udvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q13udpvcpu", scope: "lte", trust: 1, vendor: "mitsubishielectric", version: "20081", }, { model: "q03udecpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q03udvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q04udpvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q04udvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q06udpvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q06udvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q13udpvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q13udvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q26udpvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "q26udvcpu", scope: null, trust: 0.8, vendor: "mitsubishi electric", version: null, }, { model: "electric q04/06/13/26udpvcpu", scope: "eq", trust: 0.3, vendor: "mitsubishi", version: "20081", }, { model: "electric q04/06/10/13/20/26/50/100udehcpu", scope: "eq", trust: 0.3, vendor: "mitsubishi", version: "20101", }, { model: "electric q03udecpu", scope: "eq", trust: 0.3, vendor: "mitsubishi", version: "20101", }, { model: "electric q03/04/06/13/26udvcpu", scope: "eq", trust: 0.3, vendor: "mitsubishi", version: "20081", }, ], sources: [ { db: "BID", id: "106771", }, { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "NVD", id: "CVE-2019-6535", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q03udvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q03udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q04udvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q04udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06udvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q13udvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q13udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q26udvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q26udvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q04udpvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q04udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06udpvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q13udpvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q13udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q26udpvcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20081", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q26udpvcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q04udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q04udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q06udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q06udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q10udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q10udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q13udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q13udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q20udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q20udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q26udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q26udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q50udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q50udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:mitsubishielectric:q100udehcpu_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "20101", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:mitsubishielectric:q100udehcpu:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-6535", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Tri Quach of Amazon???s Customer Fulfillment Technology Security (CFTS),Tri Quach of Amazon???s Customer Fulfillment Technology Security (CFTS)", sources: [ { db: "CNNVD", id: "CNNVD-201901-973", }, ], trust: 0.6, }, cve: "CVE-2019-6535", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2019-6535", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "VHN-157970", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 7.5, baseSeverity: "High", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2019-6535", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-6535", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201901-973", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-157970", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-157970", }, { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "NVD", id: "CVE-2019-6535", }, { db: "CNNVD", id: "CNNVD-201901-973", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash. plural Mitsubishi Electric Q Series products are vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Mitsubishi Electric MELSEC-Q Series PLCs are prone to an remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition. Misubishi Electric Q03UDVCPU, etc. are all PLC (programmable logic controller) products of Japan's Mitsubishi Electric (Misubishi Electric) company. Security flaws exist in several Misubishi products. A remote attacker could exploit this vulnerability by sending a specially crafted packet to cause Ethernet to stop communicating. The following products are affected: Misubishi Q03UDVCPU; Q04UDVCPU; Q06UDVCPU; Q13UDVCPU; Q26UDPVCPU; Q03UDECPU;", sources: [ { db: "NVD", id: "CVE-2019-6535", }, { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "BID", id: "106771", }, { db: "VULHUB", id: "VHN-157970", }, ], trust: 1.98, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-6535", trust: 2.8, }, { db: "ICS CERT", id: "ICSA-19-029-02", trust: 2.8, }, { db: "BID", id: "106771", trust: 2, }, { db: "JVNDB", id: "JVNDB-2019-001917", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201901-973", trust: 0.7, }, { db: "SEEBUG", id: "SSVID-98808", trust: 0.1, }, { db: "VULHUB", id: "VHN-157970", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-157970", }, { db: "BID", id: "106771", }, { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "NVD", id: "CVE-2019-6535", }, { db: "CNNVD", id: "CNNVD-201901-973", }, ], }, id: "VAR-201902-0127", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-157970", }, ], trust: 0.85, }, last_update_date: "2023-12-18T12:43:37.803000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "MELSEC-Qシリーズ", trust: 0.8, url: "https://www.mitsubishielectric.co.jp/fa/products/cnt/plcq/items/index.html", }, { title: "Multiple Misubishi Product security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=89040", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "CNNVD", id: "CNNVD-201901-973", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-400", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-157970", }, { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "NVD", id: "CVE-2019-6535", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.8, url: "https://ics-cert.us-cert.gov/advisories/icsa-19-029-02", }, { trust: 2.3, url: "http://www.securityfocus.com/bid/106771", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-6535", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6535", }, { trust: 0.3, url: "http://www.mitsubishi-automation.com/", }, ], sources: [ { db: "VULHUB", id: "VHN-157970", }, { db: "BID", id: "106771", }, { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "NVD", id: "CVE-2019-6535", }, { db: "CNNVD", id: "CNNVD-201901-973", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-157970", }, { db: "BID", id: "106771", }, { db: "JVNDB", id: "JVNDB-2019-001917", }, { db: "NVD", id: "CVE-2019-6535", }, { db: "CNNVD", id: "CNNVD-201901-973", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-02-05T00:00:00", db: "VULHUB", id: "VHN-157970", }, { date: "2019-01-29T00:00:00", db: "BID", id: "106771", }, { date: "2019-03-29T00:00:00", db: "JVNDB", id: "JVNDB-2019-001917", }, { date: "2019-02-05T19:29:00.243000", db: "NVD", id: "CVE-2019-6535", }, { date: "2019-01-30T00:00:00", db: "CNNVD", id: "CNNVD-201901-973", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-01-31T00:00:00", db: "VULHUB", id: "VHN-157970", }, { date: "2019-01-29T00:00:00", db: "BID", id: "106771", }, { date: "2019-03-29T00:00:00", db: "JVNDB", id: "JVNDB-2019-001917", }, { date: "2023-01-31T21:03:58.657000", db: "NVD", id: "CVE-2019-6535", }, { date: "2019-10-17T00:00:00", db: "CNNVD", id: "CNNVD-201901-973", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201901-973", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Mitsubishi Electric Q Vulnerability related to resource depletion in series products", sources: [ { db: "JVNDB", id: "JVNDB-2019-001917", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-201901-973", }, ], trust: 0.6, }, }