All the vulnerabilites related to mitsubishielectric - r00cpu
cve-2020-5668
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | x_refsource_MISC | |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU95980140/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Mitsubishi Electric Corporation | MELSEC iQ-R |
Version: R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:39:25.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MELSEC iQ-R", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-17T11:15:29", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MELSEC iQ-R", "version": { "version_data": [ { "version_value": "R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier" } ] } } ] }, "vendor_name": "Mitsubishi Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "name": "https://jvn.jp/vu/JVNVU95980140/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5668", "datePublished": "2020-11-20T03:30:23", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:39:25.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20591
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU98060539/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MELSEC iQ-R series CPU modules |
Version: R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:44.388Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU98060539/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MELSEC iQ-R series CPU modules", "vendor": "n/a", "versions": [ { "status": "affected", "version": "R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to prevent legitimate clients from connecting to the MELSOFT transmission port (TCP/IP) by not closing a connection properly, which may lead to a denial of service (DoS) condition." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-11T15:52:45", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU98060539/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2021-20591", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MELSEC iQ-R series CPU modules", "version": { "version_data": [ { "version_value": "R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to prevent legitimate clients from connecting to the MELSOFT transmission port (TCP/IP) by not closing a connection properly, which may lead to a denial of service (DoS) condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU98060539/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU98060539/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2021-20591", "datePublished": "2021-06-11T15:52:45", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:45:44.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40267
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric Corporation | MELSEC iQ-F Series FX5U-32MT/ES |
Version: serial number 17X**** or later, and versions 1.280 and prior Version: serial number 179**** and prior, and versions 1.074 and prior |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:39.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1646" }, { "tags": [ "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-019_en.pdf" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU99673580/index.html" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5u-80mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5u-32mt\\/dss_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5u-32mt\\/dss_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5u-64mt\\/dss_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5u-64mt\\/dss_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/dss_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5u-80mt\\/dss_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/d_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-32mt\\/d_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-64mt\\/d_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-64mt\\/d_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-96mt\\/d_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-96mt\\/d_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-32mt\\/dss_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-64mt\\/dss_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-64mt\\/dss_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-96mt\\/dss_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-96mt\\/dss_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/ds-ts_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-32mt\\/ds-ts_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss-ts_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-32mt\\/dss-ts_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uc-32mr\\/ds-ts_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uc-32mr\\/ds-ts_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r00cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r01cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r02cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r04cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r08cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r16cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r32cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r120cpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r04encpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r04encpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r08encpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r08encpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r16encpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r16encpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r32encpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r32encpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:r120encpu_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "r120encpu_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-24mt\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-40mt\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-60mt\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-24mr\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-40mr\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-60mr\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-24mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-40mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-60mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es-a_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-24mt\\/es-a_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es-a_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-40mt\\/es-a_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es-a_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-60mt\\/es-a_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es-a_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-24mr\\/es-a_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es-a_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-40mr\\/es-a_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es-a_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5uj-60mr\\/es-a_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-30mt\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-30mt\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-40mt\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-40mt\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-60mt\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-60mt\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-80mt\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-80mt\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-30mr\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-30mr\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-40mr\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-40mr\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-60mr\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-60mr\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-80mr\\/es_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-80mr\\/es_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-30mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-30mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-40mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-40mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-60mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-60mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:mitsubishielectric:fx5s-80mt\\/ess_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fx5s-80mt\\/ess_firmware", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "1.042", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-40267", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T16:29:24.302691Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T17:23:35.219Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-32MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-64MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Seres FX5U-80MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-32MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-64MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-80MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-32MT/DS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-64MT/DS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-80MT/DS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-32MR/DS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-64MR/DS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-80MR/DS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-32MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-64MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-80MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-32MT/DSS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-64MT/DSS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5U-80MT/DSS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-32MT/D", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-64MT/D", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-96MT/D", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-32MT/DSS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-64MT/DSS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-96MT/DSS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "serial number 17X**** or later, and versions 1.280 and prior" }, { "status": "affected", "version": "serial number 179**** and prior, and versions 1.074 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-32MT/DS-TS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 1.280 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-32MT/DSS-TS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 1.280 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UC-32MR/DS-TS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 1.280 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R00CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 33 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R01CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 33 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R02CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 33 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R04CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R08CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R16CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R32CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R120CPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R04ENCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R08ENCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R16ENCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R32ENCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-R Series R120ENCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 66 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-24MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-40MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-60MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-24MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-40MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-60MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-24MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-40MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-60MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.042 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-24MT/ES-A", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.043 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-40MT/ES-A", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.043 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-60MT/ES-A", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.043 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-24MR/ES-A", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.043 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-40MR/ES-A", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.043 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5UJ-60MR/ES-A", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.043 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-30MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-40MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-60MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-80MT/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-30MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-40MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-60MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-80MR/ES", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-30MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-40MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-60MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MELSEC iQ-F Series FX5S-80MT/ESS", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "1.003 and prior" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DSS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versions 1.042 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versions 1.043 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versions 1.003 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versions 33 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versions 66 and prior allows a remote unauthenticated attacker to access the Web server function by guessing the random numbers used for authentication from several used random numbers." } ], "value": "Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DSS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versions 1.042 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versions 1.043 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versions 1.003 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versions 33 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versions 66 and prior allows a remote unauthenticated attacker to access the Web server function by guessing the random numbers used for authentication from several used random numbers." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-337", "description": "CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG) ", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-18T03:55:27.038Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-019_en.pdf" }, { "url": "https://jvn.jp/vu/JVNVU99673580/index.html" }, { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authentication Bypass Vulnerability in Web Server Function on MELSEC Series", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-40267", "datePublished": "2023-01-20T07:52:56.784Z", "dateReserved": "2022-09-08T19:40:16.931Z", "dateUpdated": "2024-08-03T12:14:39.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5527
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf | x_refsource_MISC | |
https://jvn.jp/en/vu/JVNVU91553662/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Mitsubishi Electric Corporation | MELSOFT transmission port (UDP/IP) of multiple Mitsubishi Electric MELSEC series |
Version: MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU91553662/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MELSOFT transmission port (UDP/IP) of multiple Mitsubishi Electric MELSEC series", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions)" } ] } ], "descriptions": [ { "lang": "en", "value": "When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service (DoS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-30T07:10:14", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/vu/JVNVU91553662/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MELSOFT transmission port (UDP/IP) of multiple Mitsubishi Electric MELSEC series", "version": { "version_data": [ { "version_value": "MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions)" } ] } } ] }, "vendor_name": "Mitsubishi Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service (DoS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf" }, { "name": "https://jvn.jp/en/vu/JVNVU91553662/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/vu/JVNVU91553662/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5527", "datePublished": "2020-03-30T07:10:14", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:30:24.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-16850
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:45:33.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-30T21:34:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-16850", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series", "refsource": "MISC", "url": "https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-16850", "datePublished": "2020-11-30T21:34:28", "dateReserved": "2020-08-04T00:00:00", "dateUpdated": "2024-08-04T13:45:33.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202003-1411
Vulnerability from variot
When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions. Provided by Mitsubishi Electric Corporation MELSEC iQ-R , iQ-F , Q , L , F Of the series MELSOFT Communication port (UDP/IP) Is a resource exhaustion vulnerability (CWE-400) Exists. MELSOFT If a large amount of data is sent to the communication port, the resources will be exhausted and processing will not be performed on that port, which will interfere with service operation. (DoS) It may be in a state. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.MELSOFT If the communication port goes into an unprocessable state, a normal client MELSOFT You will not be able to connect to the communication port. Also, it becomes difficult to connect devices that are communicating on other communication ports. Misubishi Electric MELSEC iQ-R series, etc. are all programmable logic controllers of Japan Mitsubishi Electric (Misubishi Electric) company.
Many Mitsubishi Electric products have resource management error vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1411", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fx3s", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q25phcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02scpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx5uj", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3gc", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r16cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r08cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02scpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3g", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q12prhcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q25prhcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r08encpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q24dhccpu-vg2", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r32cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q02phcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q26dhccpu-ls", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q173nccpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "cr800-q", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q12phcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q12dccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r16encpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q24dhccpu-ls", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx5u", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02cpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx5uc", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-bt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r02cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r04cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r32encpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r120encpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q06phcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3u", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l06cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-pbt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q172dscpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q173dscpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r120cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r00cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q24dhccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r01cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "r04encpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l06cpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3uc", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "melsec f series", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "melsec iq-f series", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "melsec iq-r series", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "melsec l series", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "melsec q series", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "electric melsec iq-r series", "scope": null, "trust": 0.6, "vendor": "misubishi", "version": null }, { "model": "electric melsec iq-f series", "scope": null, "trust": 0.6, "vendor": "misubishi", "version": null }, { "model": "electric melsec q series", "scope": null, "trust": 0.6, "vendor": "misubishi", "version": null }, { "model": "electric melsec l series", "scope": null, "trust": 0.6, "vendor": "misubishi", "version": null }, { "model": "electric melsec f series", "scope": null, "trust": 0.6, "vendor": "misubishi", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29576" }, { "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "db": "NVD", "id": "CVE-2020-5527" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:cr800-q_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:cr800-q:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx3g_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx3g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx3gc_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx3gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx3s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx3s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx3u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx3u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx3uc_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx3uc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx5u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx5u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx5uc_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx5uc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:fx5uj_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:fx5uj:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l02cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l02cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l02cpu-p_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l02cpu-p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l02scpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l02scpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l02scpu-p_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l02scpu-p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l06cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l06cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l06cpu-p_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l06cpu-p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l26cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l26cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l26cpu-bt_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l26cpu-bt:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l26cpu-p_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l26cpu-p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:l26cpu-pbt_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:l26cpu-pbt:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q02phcpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q02phcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q06phcpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q06phcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q12dccpu-v_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q12dccpu-v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q12phcpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q12phcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q12prhcpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q12prhcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q172dscpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q172dscpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q173dscpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q173dscpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q173nccpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q173nccpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q24dhccpu-ls_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q24dhccpu-ls:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q24dhccpu-v_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q24dhccpu-v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q24dhccpu-vg2_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q24dhccpu-vg2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q25phcpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q25phcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q25prhcpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q25prhcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:q26dhccpu-ls_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:q26dhccpu-ls:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r04encpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r04encpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08encpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08encpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120encpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120encpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16encpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16encpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32encpu_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32encpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5527" } ] }, "cve": "CVE-2020-5527", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-002958", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-29576", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-002958", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-5527", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2020-002958", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-29576", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202003-1699", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29576" }, { "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "db": "NVD", "id": "CVE-2020-5527" }, { "db": "CNNVD", "id": "CNNVD-202003-1699" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions. Provided by Mitsubishi Electric Corporation MELSEC iQ-R \uff0c iQ-F \uff0c Q \uff0c L \uff0c F Of the series MELSOFT Communication port (UDP/IP) Is a resource exhaustion vulnerability (CWE-400) Exists. MELSOFT If a large amount of data is sent to the communication port, the resources will be exhausted and processing will not be performed on that port, which will interfere with service operation. (DoS) It may be in a state. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.MELSOFT If the communication port goes into an unprocessable state, a normal client MELSOFT You will not be able to connect to the communication port. Also, it becomes difficult to connect devices that are communicating on other communication ports. Misubishi Electric MELSEC iQ-R series, etc. are all programmable logic controllers of Japan Mitsubishi Electric (Misubishi Electric) company. \n\r\n\r\nMany Mitsubishi Electric products have resource management error vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2020-5527" }, { "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "db": "CNVD", "id": "CNVD-2020-29576" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-5527", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU91553662", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-20-091-02", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-002958", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-29576", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1157", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202003-1699", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29576" }, { "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "db": "NVD", "id": "CVE-2020-5527" }, { "db": "CNNVD", "id": "CNNVD-202003-1699" } ] }, "id": "VAR-202003-1411", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-29576" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-29576" } ] }, "last_update_date": "2023-12-18T11:53:22.393000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSOFT\u4ea4\u4fe1\u30dd\u30fc\u30c8\uff08UDP/IP\uff09\u306b\u304a\u3051\u308b\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-005.pdf" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002958" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5527" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://jvn.jp/en/vu/jvnvu91553662/index.html" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5527" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-091-02" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91553662/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5527" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1157/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "db": "NVD", "id": "CVE-2020-5527" }, { "db": "CNNVD", "id": "CNNVD-202003-1699" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-29576" }, { "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "db": "NVD", "id": "CVE-2020-5527" }, { "db": "CNNVD", "id": "CNNVD-202003-1699" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-22T00:00:00", "db": "CNVD", "id": "CNVD-2020-29576" }, { "date": "2020-03-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "date": "2020-03-30T08:15:17.640000", "db": "NVD", "id": "CVE-2020-5527" }, { "date": "2020-03-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1699" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-24T00:00:00", "db": "CNVD", "id": "CNVD-2020-29576" }, { "date": "2020-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002958" }, { "date": "2020-04-07T13:49:38.617000", "db": "NVD", "id": "CVE-2020-5527" }, { "date": "2020-04-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-1699" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-1699" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric MELSEC Of the series MELSOFT Resource exhaustion vulnerability in communication ports", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002958" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-1699" } ], "trust": 0.6 } }
var-202011-1261
Vulnerability from variot
Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet. Provided by Mitsubishi Electric Corporation MELSEC iQ-R Resource exhaustion vulnerabilities in series units (CWE-400) Exists This vulnerability information is provided by the developer for the purpose of making it known to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.Crafted by a remote third party SLMP Receiving packets can have the following effects: * CPU In the case of a unit, an error occurs and program execution and communication interfere with service operation. (DoS) Become in a state * CPU In the case of other than the unit, communication via the unit interferes with service operation. (DoS) In addition, a reset is required for recovery
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "r32cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "rj71en71", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "r16pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r01cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "19" }, { "model": "rj71gp21s-sx", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "rj71c24-r4", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "r00cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "19" }, { "model": "r08cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r32sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "rj71c24-r2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "r04cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r08psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "r16psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "r120pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r32pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r120cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r02cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "19" }, { "model": "r32psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "rj71gf11-t2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "rj72gf15-t2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "07" }, { "model": "r08sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "r16sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "r16cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r120sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "rj71gn11-t2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "11" }, { "model": "r08pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r120psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "rj71gp21-sx", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gp21s-sx firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gp21-sx firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gn11-t2 firmware \"11\" and later" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj72gf15-t2 firmware \"07\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r00/01/02cpu firmware \"19\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71en71 firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r08/16/32/120psfcpu firmware \"06\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71c24 (-r2/r4) all s" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r08/16/32/120sfcpu firmware \"22\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gf11-t2 firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r08/16/32/120pcpu firmware \"25\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r04/08/16/32/120 (en) cpu firmware \"51\" and earlier" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5668" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Xiaofei.Zhang reported this vulnerability to Mitsubishi Electric.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1663" } ], "trust": 0.6 }, "cve": "CVE-2020-5668", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-5668", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-5668", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-009595", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-5668", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2020-009595", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202011-1663", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet. Provided by Mitsubishi Electric Corporation MELSEC iQ-R Resource exhaustion vulnerabilities in series units (CWE-400) Exists This vulnerability information is provided by the developer for the purpose of making it known to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.Crafted by a remote third party SLMP Receiving packets can have the following effects: * CPU In the case of a unit, an error occurs and program execution and communication interfere with service operation. (DoS) Become in a state * CPU In the case of other than the unit, communication via the unit interferes with service operation. (DoS) In addition, a reset is required for recovery", "sources": [ { "db": "NVD", "id": "CVE-2020-5668" }, { "db": "JVNDB", "id": "JVNDB-2020-009595" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVNVU95980140", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-20-324-05", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2020-5668", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-009595", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.4117", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202011-1663", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "id": "VAR-202011-1261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2022-05-04T09:59:40.179000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSEC\u00a0iQ-R Of the series Ethernet Denial of service on port \u00a0(DoS)\u00a0 Vulnerability", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "title": "Mitsubishi Electric MELSEC iQ-R series Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=137118" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.0 }, { "problemtype": "Resource exhaustion (CWE-400) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "trust": 1.6, "url": "https://jvn.jp/vu/jvnvu95980140/index.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95980140" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4117/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5668" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "date": "2020-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "date": "2020-11-20T04:15:00", "db": "NVD", "id": "CVE-2020-5668" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-15T06:01:00", "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "date": "2021-12-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "date": "2022-04-29T13:21:00", "db": "NVD", "id": "CVE-2020-5668" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1663" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric \u00a0MELSEC\u00a0iQ-R\u00a0 Resource exhaustion vulnerabilities in the series", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1663" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
▼ | URL | Tags | |
---|---|---|---|
Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp | https://jvn.jp/vu/JVNVU99673580/index.html | Mitigation, Third Party Advisory | |
Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp | https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02 | Mitigation, Third Party Advisory, US Government Resource | |
Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-019_en.pdf | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU99673580/index.html | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-019_en.pdf | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1646 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/ess_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D921030A-1359-420F-B8A1-E29ECF34DD9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5u-80mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EBE129E-CDEF-49D4-A81D-C8E73C54F6D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5u-32mt\\/dss_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E60CB008-DB9C-4233-A0EA-71E379F3B6E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5u-32mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8E431E0-759C-4199-BFFE-82F6251160F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5u-64mt\\/dss_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0A9A631-6BEB-4BEE-9F5A-5C7A43DD6991", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5u-64mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "5337A36D-029D-4E59-BAAB-9A7A20640C92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5u-80mt\\/dss_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4198EF4-E3C0-43DC-A8DD-1DC3FFE4CF59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5u-80mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "195CB538-682F-44A7-BEEC-3554737C251F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E2293F8-1A3F-4880-BCF5-B3A7DFF01F35", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBFA917-5DCF-4B0C-8C32-AC384FB880AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-64mt\\/d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFBCB848-E656-4488-9BE5-62EEEA6526C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-64mt\\/d:-:*:*:*:*:*:*:*", "matchCriteriaId": "49F19AFE-8A0C-4F21-AE83-5DE3040917C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-96mt\\/d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "465D93FB-7B58-4E2F-85C7-D1462F3A4928", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-96mt\\/d:-:*:*:*:*:*:*:*", "matchCriteriaId": "5233D432-3102-421D-B4F5-66469C28DF3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C554660B-CDC7-4DAA-8741-CFC546A6D678", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFE160B-32CC-4529-AD35-7467A32B609E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-64mt\\/dss_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF9F7F63-A79C-4F3F-B1F3-C3C974DB7649", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-64mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDE9CE57-6C80-4547-8476-55E5CA4BFCE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-96mt\\/dss_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B45CBED0-6B75-4FC8-A55E-4EAA60C1E99C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-96mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "491D865E-3C0A-4ED7-AEAF-A0D69D832DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/ds-ts_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E636C3F-15C5-4509-9D14-A5868FDF59BE", "versionEndExcluding": "1.280", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/ds-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4B64FFA-59CE-46E9-B240-F083B332BFD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss-ts_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3542B37-83C0-46FB-B93E-3F7002BF5E37", "versionEndExcluding": "1.280", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "2122A970-5A7D-40A6-BB97-622B695713ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mr\\/ds-ts_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E4CBE2-A786-4D19-A0B6-ADB240FC8B15", "versionEndExcluding": "1.280", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mr\\/ds-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "6319D639-CC7B-414E-9DCB-F9D427E8FEF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BAECA77-FAF2-4A92-AEC4-E9CE6E97191E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A23F21-9C5F-4CB3-BA20-4195B2165D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "509CC970-A464-4B21-9094-2B0C2CE63F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CADF6528-4B25-4779-A06F-2C4DF91DAE90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181FBE97-4AC2-4E5E-B8F3-5990801D2581", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D753C47-ED9C-453F-AC1F-C50476BE61C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F8AA4E-EA6B-49B8-B370-B4FFEA158C93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDEEF15E-FE32-4610-9E14-891069573E4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D4C04EE-0130-4CD7-94A0-7E007C166B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DAA2202-88D5-4329-BF51-0F18C350C45C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EDB93E-5A80-4874-8B70-4609137E0120", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "30016EA0-FB24-4382-8960-6A75D32C9BD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "140158F4-08B3-4BEF-95DE-28A3C272ABB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6EB84-7D97-4606-A90F-9D443CBC4755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0639C212-1596-4B3F-BDA9-722D43119F5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF7D08E-D3D1-48D4-9440-B94B7A2BD662", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3A76FE2-43E4-4B70-972B-24D68029686F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5862905-F77D-4DEE-88A8-59893362936F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4395FC87-A7E6-4023-A3D7-EE2BE1889214", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B85DAD9-7F5B-4740-94A3-94835D82CE3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE9C85A1-0CDE-44FF-ACF2-22DCD0D04B00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F7DE17-AA44-4E78-B07B-3D9F641DF445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "088D771F-0978-4549-A7AA-A90C79BDA5F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "9546A301-8039-4D42-B1A2-AAF6C3C17203", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E817A24C-8299-428E-B31B-F9921B6677AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "411C7828-D7C7-4B42-82E3-CAC21C15951C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F4CD580-5C59-45D5-BEF3-B7A5B2E96F19", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B284B91-7571-4614-A721-676D1972E2D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A47AB36D-B6F7-4330-AB6B-7AB5F0019AF5", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ED5C2F9-C203-40FD-B15C-F91A68FA0DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB903643-C115-42D2-AF6E-B179B1FB7518", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F5B2760-4E56-4FAA-A723-BB7CC28FAFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3AD2D36-3207-40B6-92D1-680778FA90CE", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F4BA009-4F0A-427C-9D4A-F8A128F5F8C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B652095-2AF4-40E1-8F1F-7091300A69A6", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B0AA6C3-68CC-454B-A959-707BB20F4E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AFB2BB5-12E2-4C9B-B29F-23C950D669D0", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CAF8ED8-B265-4FC5-91AE-CFA4C282E27F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94D7BC2A-4752-4C61-9DD9-9F89CA532139", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D8A69D9-DE42-4953-AD81-40EF7A003823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9B76606-718B-482B-BC89-2282F11FFB05", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A38E527-6290-49AE-885A-21C4FC77EE96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "440AB6A4-F7F9-4F35-9B53-28F0D2CB4DBC", "versionEndExcluding": "1.042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7625B11E-0A91-46D2-8952-AC0BA956D7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09A23CB9-0E4B-47EC-A0D1-A714D037872E", "versionEndExcluding": "1.043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/es-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "345CD57D-EC2D-4A9E-B4A3-9E32535ECC23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "153F5CDB-53EB-4F20-8A82-E490103781CF", "versionEndExcluding": "1.043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/es-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F93585F-E50B-4EFB-AD36-538D2780C9F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "205E06C1-8DC0-485C-A0C1-BB78D87671D1", "versionEndExcluding": "1.043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/es-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "427E4718-7C06-4E32-937B-F7C1DDCC1417", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "131BB94A-CF84-4DD0-B643-DA0C47CBD3EB", "versionEndExcluding": "1.043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/es-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "330C0F0C-CDD8-4F69-AC97-4FCE2B18FDEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA992DA5-237F-4964-ADE2-F40F4B96205C", "versionEndExcluding": "1.043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/es-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "02EDA888-358E-4207-A887-C376A13C6865", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C6A2E33-F616-46E8-9A60-C13170FD65B0", "versionEndExcluding": "1.043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/es-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E9C2820-AE1B-46CD-B89E-F7DB9956F821", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-30mt\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE270231-9F8F-4414-8E2F-3438D5257A8F", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-30mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "220F7702-E3A5-423D-B8E9-497E6D13AC96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-40mt\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB5D38B2-4436-4105-B649-07AD43C0879B", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-40mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8420F36A-8929-412F-B76C-D5EC0C02DE85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-60mt\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C65675F-44BE-4440-8215-C35E6AECE50B", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-60mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A1CB7DA-A3E4-4ED3-8C89-6D191539C697", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-80mt\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55F6070C-DAA4-4617-82D4-B3EAFA64AE02", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-80mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "A71E25F0-29AE-4924-9A32-BF597C58034F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-30mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0E308C8-E9D7-4910-9DB5-528CB96D7ED4", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-30mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "9399ED33-EE3C-4414-8A64-302818CCB800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-40mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13268532-24E7-42ED-818D-516139F1963E", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "65FF4238-35D3-47D6-B525-25BCF3A2387D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-60mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "311D5523-B030-4743-9C3E-85327AA2642A", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-60mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "452DE6F2-39A0-401C-905B-BA3D98DAE4B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-80mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9AD8F22-7DA7-4725-B4F9-513111288C40", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-80mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A92C4E6-6D6B-4A68-9920-CD37E1E49B31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-30mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9BBD7BC-C473-47F8-9EAD-1FAC778DDC5B", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-30mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D96E9F3-772A-4409-BD58-1B11849B5B0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-40mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "989AEAFE-F7DB-4A14-AE5A-97ED94C6F2AD", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A9BFDA-4780-4747-8B55-B111C0502BFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-60mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6093C0AD-3614-4F49-85F7-ABFD701070BE", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-60mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5589A7F-1159-4CD1-86FB-1392E8D17F3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5s-80mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEAE4245-E5EC-4530-9CC8-B718A14949AD", "versionEndExcluding": "1.003", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5s-80mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE63C5E-36DC-4650-AF9B-C324FDA475A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DSS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versions 1.042 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versions 1.043 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versions 1.003 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versions 33 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versions 66 and prior allows a remote unauthenticated attacker to access the Web server function by guessing the random numbers used for authentication from several used random numbers." }, { "lang": "es", "value": "Predictable Seed en el Pseudo-Random Number Generator (PRNG) en Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS ) con n\u00famero de serie 17X**** o posterior, y versiones 1.280 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES, DS,ESS,DSS) con n\u00famero de serie 179**** y anteriores, y versiones 1.074 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z =D,DSS)) con n\u00famero de serie 17X**** o posterior, y versiones 1.280 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z =D,DSS)) con n\u00famero de serie 179**** y anteriores, y versiones 1.074 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versiones 1.280 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Serie FX5UC-32MT/DSS-TS versiones 1.280 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Serie FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versiones 1.042 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versiones 1.043 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versiones 1.003 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versiones 1.280 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versiones 33 y anteriores, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versiones 66 y anteriores permiten que un atacante remoto no autenticado acceda a la Web funci\u00f3n del servidor adivinando los n\u00fameros aleatorios utilizados para la autenticaci\u00f3n a partir de varios n\u00fameros aleatorios utilizados." } ], "id": "CVE-2022-40267", "lastModified": "2024-11-21T07:21:09.770", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-20T08:15:11.373", "references": [ { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU99673580/index.html" }, { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02" }, { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-019_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU99673580/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-019_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1646" } ], "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-337" } ], "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-335" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:cr800-q_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF2A7CBE-E5C3-425E-8B96-68B00D91C78B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:cr800-q:-:*:*:*:*:*:*:*", "matchCriteriaId": "26BB628D-BE6A-493D-8AF3-F0F7C2744D5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A1590B-D508-4B52-815C-D2B74DE9BB90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A25D12B9-D2F2-4F42-A227-20B1E65A14CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3gc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BF49EC6-DA86-475E-B67A-50E55F4849B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D319713C-7222-429B-87E3-3C4BFCD23E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EC1317A-3E2D-4EC1-B3C8-3535DA9E0F67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BB478B-D589-45A1-9149-3A76941AE4BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE6315A-D01D-40B4-B1FD-8E9D4B1F7BA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E76BD47-E635-48F2-AE04-6682E8AC3766", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C92EBEF-9479-4E84-9DAF-29D1F9784155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A879DAAF-F3F5-4800-9C2F-0C6F38EEFC4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00BF039E-A541-4A79-83EC-C5A6779975B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5u:-:*:*:*:*:*:*:*", "matchCriteriaId": "599F54D9-E6F4-4244-B251-CDA5213654BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "66B8BB34-6DC1-459A-9C82-C54CC44F9D03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc:-:*:*:*:*:*:*:*", "matchCriteriaId": "58019A30-5F53-4E6A-AADA-A002C8B73C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2526AE1D-EE80-4828-AD4B-DD1E985F238B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj:-:*:*:*:*:*:*:*", "matchCriteriaId": "71622C45-9436-4AC0-8DFC-C05E4F92EA61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E9318C-B3FA-43A5-8509-285FD1968D6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "125482D3-8FA3-4E80-BE4D-29C3C721C624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02cpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1B0BC24-11B5-4174-8877-966FE4ED959D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02cpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC3E9C7-04C0-43F1-99B2-0C2471238A13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02scpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "739910FB-4D30-4E48-823A-778390DC7691", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02scpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC87459F-DB5E-4A5F-BFFC-B2026405F74B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02scpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A0F2373-BC92-42D8-A076-92B6AC32B3AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02scpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "61414DA7-87A6-421E-B75D-5D4283B54C41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l06cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B804C2-CF55-42C5-BBE2-2035C1FAEF58", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l06cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "63C8CF5F-FFDF-4403-96D0-46A7FECAC5E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l06cpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23DAE700-6C44-4DB6-83F0-1FC4C687B8F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l06cpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "961B56BC-F78C-44CC-885E-3451DFDF29EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1BC66-A107-4ADA-B0EE-82C71CFEC105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "1884BE8D-FFCD-4089-9F0B-519C8F570FCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-bt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15080C41-2C1F-46E8-920A-EDAE23E6CCB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-bt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3966C103-5181-49E3-878F-A0AF9F1DBA76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "361DEFFD-40FD-4B5F-ACFC-A62C165D4072", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD2A6CD-32DE-49F0-89F4-C130F0809766", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-pbt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3C588A-1BFF-47B5-A658-EAF93F437E8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-pbt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60BE93D-B60D-4F45-ACD3-7B64C0C45D83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q02phcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02651218-2B85-4991-8379-0EE3B4B8A291", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q02phcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B20D1BF-244D-4053-AF21-8A4940CC07DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06phcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BE0617-11A9-45E8-A08B-C07ED0F13FC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06phcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "209C8EA9-FCF9-4328-ABFC-39E9AD3DED33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q12dccpu-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00B24F2C-950F-4629-BBA5-ECE4B54A451A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q12dccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EBEC354-7543-4351-AD8F-0A501FF9F3CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q12phcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1226F70B-39A4-4646-8B4A-366C5AA419C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q12phcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "4990FA80-B3FE-4BB5-BBC9-121AD277CEEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q12prhcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3EAE7F3-7923-4D8C-B60A-8391689C1FCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q12prhcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4070CA9-B707-4888-B46E-3A158639133B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q172dscpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EFFD6EB-DEC6-480B-A291-5EB06E2595DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q172dscpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD93A14A-0E09-4355-82D0-143A959658D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q173dscpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A75998-BB23-4E99-8970-6BFD73207031", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q173dscpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "597ED633-B087-46BD-832F-0978A5E1958D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q173nccpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31EF117-F724-4F65-828D-43B6490F1CA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q173nccpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3309D461-6E1F-4742-9864-C1C950EA6E6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-ls_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D8B0EF-E4A0-49C9-A3A3-2B3853F6A87B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-ls:-:*:*:*:*:*:*:*", "matchCriteriaId": "7450DA08-2475-4256-B458-E4164577EF6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86321C61-6585-42AC-93AE-3AFE1A304BD1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "210A2E8A-BF20-43F5-BA07-CB662833DE1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-vg2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DAE5B0E-9453-4440-9671-E9CAF2C4D804", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-vg2:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B8ADB2-9EF6-4B8D-92E6-B06D129DB399", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q25phcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF11C54C-DB60-4D0E-B427-A751F0EEA933", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q25phcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "329F14BA-2BA2-4C5B-BA00-CFAF007842A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q25prhcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8999B0E3-8592-490D-8F97-E7A0CF7DD53C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q25prhcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BB1653B-A02B-48BA-9393-BF3337D02E33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26dhccpu-ls_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99135DCE-0336-45B4-A04A-30EB50A6F96C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26dhccpu-ls:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A79557-71AA-466E-9E1E-EEE00B54386A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BAECA77-FAF2-4A92-AEC4-E9CE6E97191E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A23F21-9C5F-4CB3-BA20-4195B2165D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "509CC970-A464-4B21-9094-2B0C2CE63F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CADF6528-4B25-4779-A06F-2C4DF91DAE90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181FBE97-4AC2-4E5E-B8F3-5990801D2581", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D753C47-ED9C-453F-AC1F-C50476BE61C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F8AA4E-EA6B-49B8-B370-B4FFEA158C93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDEEF15E-FE32-4610-9E14-891069573E4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3A76FE2-43E4-4B70-972B-24D68029686F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5862905-F77D-4DEE-88A8-59893362936F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D4C04EE-0130-4CD7-94A0-7E007C166B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DAA2202-88D5-4329-BF51-0F18C350C45C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4395FC87-A7E6-4023-A3D7-EE2BE1889214", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B85DAD9-7F5B-4740-94A3-94835D82CE3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0639C212-1596-4B3F-BDA9-722D43119F5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF7D08E-D3D1-48D4-9440-B94B7A2BD662", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E817A24C-8299-428E-B31B-F9921B6677AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "411C7828-D7C7-4B42-82E3-CAC21C15951C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EDB93E-5A80-4874-8B70-4609137E0120", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "30016EA0-FB24-4382-8960-6A75D32C9BD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE9C85A1-0CDE-44FF-ACF2-22DCD0D04B00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F7DE17-AA44-4E78-B07B-3D9F641DF445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "140158F4-08B3-4BEF-95DE-28A3C272ABB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6EB84-7D97-4606-A90F-9D443CBC4755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32encpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "088D771F-0978-4549-A7AA-A90C79BDA5F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "9546A301-8039-4D42-B1A2-AAF6C3C17203", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions." }, { "lang": "es", "value": "Cuando el puerto de transmisi\u00f3n de MELSOFT (UDP/IP) de la serie Mitsubishi Electric MELSEC iQ-R (todas las versiones), la serie MELSEC iQ-F (todas las versiones), la serie MELSEC Q (todas las versiones), la serie MELSEC L (todas las versiones) y la serie MELSEC F (todas las versiones), recibe una cantidad masiva de datos por medio de vectores no especificados, un consumo de recursos se presenta y el puerto no procesa los datos apropiadamente. Como resultado, puede caer en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). El proveedor declara que esta vulnerabilidad solo afecta las funciones de comunicaci\u00f3n Ethernet." } ], "id": "CVE-2020-5527", "lastModified": "2024-11-21T05:34:13.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-30T08:15:17.640", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU91553662/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU91553662/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/vu/JVNVU95980140/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | Third Party Advisory, US Government Resource | |
vultures@jpcert.or.jp | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | Vendor Advisory | |
vultures@jpcert.or.jp | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU95980140/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6314D599-F0B6-4D42-A6F5-985F09BD1694", "versionEndIncluding": "19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A23F21-9C5F-4CB3-BA20-4195B2165D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAB241EF-238E-44BF-8995-4DC2EC4DBF69", "versionEndIncluding": "19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CADF6528-4B25-4779-A06F-2C4DF91DAE90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD971E61-145F-425C-A5E0-788CA22A9464", "versionEndIncluding": "19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D753C47-ED9C-453F-AC1F-C50476BE61C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17518878-FF10-498F-A506-93D76D5F6371", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDEEF15E-FE32-4610-9E14-891069573E4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFAE4231-9FC7-4744-8652-1AC0202C5298", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DAA2202-88D5-4329-BF51-0F18C350C45C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4C99DED-CA7F-496A-ADDF-3B2C8D5D6792", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "30016EA0-FB24-4382-8960-6A75D32C9BD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1D0609F-30CB-424B-890E-F9BDF8A6606F", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6EB84-7D97-4606-A90F-9D443CBC4755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC00F22C-BFEF-41E9-9B49-9FDE2B0D5804", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF7D08E-D3D1-48D4-9440-B94B7A2BD662", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E49CF5A5-8F0E-4E41-9B6F-15641CD32E29", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B185323A-C9E3-48A0-AD28-DA7AC7846E18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "844B3E94-7F24-4523-AE29-55D5C55D4A99", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4BBE066-33C4-4410-85D3-4B77B3773330", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15096442-7E6B-4846-9A8F-01023A54DFA0", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F6304BE-DAEE-49AB-B0B1-CEE6878CBECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DE2946C-E8C0-4253-B84C-16A81767343E", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "515BDC46-5A1C-4A94-816A-B4751BB1B58D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F94C8F7E-8626-434C-A699-99751BE9D60E", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3845683A-A4D2-422F-9736-D0D7A430555F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D993D0D-FA5B-4819-86C2-F182464CFFAF", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA04F2DD-4D51-4D4F-B3C7-D5EFACAD6EFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7354680-CF1D-4CA6-BC3F-39DA0B621612", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EA2A77C-86CE-48E1-87A4-A69895102D49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "974AB564-75E3-4ADF-9F25-7DFDCFF4D03A", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0FE9EA6-6BCE-40F7-8AE8-173F7CDF3EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42566660-1AD6-466C-B07C-D263F701774B", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA37F2FC-8F75-4FEA-882D-87AD5CC1558E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "732D97FD-3D80-43A6-B41A-3B3BFC09E152", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "17AD5875-B7D7-498B-9484-23049753133E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B92974DE-CD79-470B-9308-6D4FEF1C689B", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EC2594C-6067-40BA-B8B2-AEC9B9C7922F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9DA8768-E0AD-4603-9C3C-AE7E02BEFBC9", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA3FB3E1-D7D3-424B-A207-D3C6F4365D12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9EDD7F7-18C8-424E-9808-409080AAC764", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EDC22E7-38B1-42DF-9F48-BAB477156B54", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA16A0DE-CBBD-4871-85C8-1F3AD7D2A074", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A35CD177-3A86-4E6A-99CE-089CCDD38A14", "versionEndIncluding": "07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC7B087E-9F37-4D35-90E3-3BAB91D4A69C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918EA7ED-100C-4A4B-B848-C41E0B821FE3", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F31A6CCB-56E8-4C79-8121-B0DFAB4C32E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E54F3518-DB4E-4DE1-B97D-37860CF88BAC", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*", "matchCriteriaId": "95224DAD-C888-451D-9A2B-F7583A5837B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBD7FC5-859D-419E-BAAE-B4E58FDA0887", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E93B863-EDC2-4584-B998-A0CF23824037", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61EA2C4A-216B-42EB-BA67-70C060C25DAC", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EB02306-42B5-46EA-AD6A-79041E36FA2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "608DB833-3477-4596-80A5-99AE0A3A4993", "versionEndIncluding": "11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5FE39-4540-4A95-ABA8-15F8EA545DE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" }, { "lang": "es", "value": "Vulnerabilidad de consumo incontrolado de recursos en los m\u00f3dulos de la serie iQ-R de MELSEC (R00/01/02CPU firmware versi\u00f3n \u002719\u0027 y anteriores, R04/08/16/32/120 (ES) CPU firmware versi\u00f3n \u002751\u0027 y anteriores, R08/16/32/120SFCPU firmware versi\u00f3n \u002722\u0027 y anteriores, R08/16/32/120PCPU firmware versi\u00f3n \u002725\u0027 y anterior, R08/16/32/120PSFCPU firmware versi\u00f3n \u002706\u0027 y anterior, RJ71EN71 firmware versi\u00f3n \u002747\u0027 y anterior, RJ71GF11-T2 firmware versi\u00f3n \u002747\u0027 y anterior, RJ72GF15-T2 firmware versi\u00f3n \u002707\u0027 y anterior, RJ71GP21-SX firmware versi\u00f3n \u002747\u0027 y anterior, RJ71GP21S-SX firmware versi\u00f3n \u002747\u0027 y anterior, y RJ71GN11-T2 firmware versi\u00f3n \u002711\u0027 y anteriores) permite a un atacante remoto no autentificado provocar un error en una CPU y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en la ejecuci\u00f3n del programa y su comunicaci\u00f3n, o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en la comunicaci\u00f3n a trav\u00e9s de la unidad mediante la recepci\u00f3n de un paquete SLMP especialmente dise\u00f1ado" } ], "id": "CVE-2020-5668", "lastModified": "2024-11-21T05:34:27.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-20T04:15:11.423", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series | Third Party Advisory | |
cve@mitre.org | https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97A4E159-7ECF-4812-95E1-3C8A61B41C3F", "versionEndIncluding": "20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A23F21-9C5F-4CB3-BA20-4195B2165D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EA80A6F-79B8-4C58-9D0D-F7D423B16B04", "versionEndIncluding": "20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CADF6528-4B25-4779-A06F-2C4DF91DAE90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8BF074-220A-46BF-8B4E-7B30637FC997", "versionEndIncluding": "20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D753C47-ED9C-453F-AC1F-C50476BE61C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C0D8F6B-F137-4A05-8F78-55119F12B3A0", "versionEndIncluding": "52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDEEF15E-FE32-4610-9E14-891069573E4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83D2C9C7-B838-4EE1-87D9-BBD9FA3C5D30", "versionEndIncluding": "52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DAA2202-88D5-4329-BF51-0F18C350C45C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE02A6F0-DB39-441C-B6A0-86611A7BAA80", "versionEndIncluding": "52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "30016EA0-FB24-4382-8960-6A75D32C9BD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8DEE4EE-73F6-437A-B00F-AAC76EA4266E", "versionEndIncluding": "52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6EB84-7D97-4606-A90F-9D443CBC4755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A130EB-63CF-4766-AFA6-66BC90118153", "versionEndIncluding": "52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF7D08E-D3D1-48D4-9440-B94B7A2BD662", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E49CF5A5-8F0E-4E41-9B6F-15641CD32E29", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B185323A-C9E3-48A0-AD28-DA7AC7846E18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "844B3E94-7F24-4523-AE29-55D5C55D4A99", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4BBE066-33C4-4410-85D3-4B77B3773330", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15096442-7E6B-4846-9A8F-01023A54DFA0", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F6304BE-DAEE-49AB-B0B1-CEE6878CBECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DE2946C-E8C0-4253-B84C-16A81767343E", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "515BDC46-5A1C-4A94-816A-B4751BB1B58D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63442274-452B-4361-A2AD-2ACBD699B150", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3845683A-A4D2-422F-9736-D0D7A430555F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE0EA636-84E9-4DAA-BE39-DBA9D7B857F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA04F2DD-4D51-4D4F-B3C7-D5EFACAD6EFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "275C5686-5333-440F-8C85-8C2FB91FC2DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EA2A77C-86CE-48E1-87A4-A69895102D49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EC951AC-3538-4711-A034-6C1A94AD797F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0FE9EA6-6BCE-40F7-8AE8-173F7CDF3EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16mtcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6627431-2E42-4D76-A6D7-D75756BC63AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16mtcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "921A907D-DD83-44C7-BEFA-A1A38679FFB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32mtcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E9E24CF-45D3-4162-BE69-92FE571C0189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32mtcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD83C6E4-56E8-4854-8711-B280D7626021", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r64mtcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEF3452-1DDC-4D43-BD82-AB877451F57D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r64mtcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E1F2092-ABFD-4510-84C3-C0945512C15B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2." }, { "lang": "es", "value": "Los PLC de la serie Mitsubishi MELSEC iQ-R con firmware 49 permiten a un atacante no autenticado detener el proceso industrial enviando un paquete dise\u00f1ado a trav\u00e9s de la red. Este ataque de denegaci\u00f3n de servicio expone una Validaci\u00f3n de Entrada Inapropiada. Despu\u00e9s de detenerse, el acceso f\u00edsico al PLC es requerido para restaurar la producci\u00f3n y se pierde el estado del dispositivo. Esto est\u00e1 relacionado con R04CPU, RJ71GF11-T2, R04CPU y RJ71GF11-T2" } ], "id": "CVE-2020-16850", "lastModified": "2024-11-21T05:07:16.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-30T22:15:10.840", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B45CE88C-9D71-4F5F-B10B-ABBAE40597FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A23F21-9C5F-4CB3-BA20-4195B2165D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D54E1B-A2E3-49E7-B7A0-B693AA9E410F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CADF6528-4B25-4779-A06F-2C4DF91DAE90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "927EB3AB-4EE4-4FC0-AADE-939C2BB89850", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D753C47-ED9C-453F-AC1F-C50476BE61C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F60DD8B4-CFF5-4331-8BC2-49D3583B0F6B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDEEF15E-FE32-4610-9E14-891069573E4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5755570C-4913-44C4-A906-BBB59616D336", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DAA2202-88D5-4329-BF51-0F18C350C45C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5996B1E9-F9AD-4890-833E-926B31AE9113", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "30016EA0-FB24-4382-8960-6A75D32C9BD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0629A-A3AA-4FEF-9F93-5E86DF3B9B16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6EB84-7D97-4606-A90F-9D443CBC4755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C593DC3-776B-483C-A6B8-03A65671D4B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF7D08E-D3D1-48D4-9440-B94B7A2BD662", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D3AC7B-50E0-47D5-B0D1-07329D724EFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B185323A-C9E3-48A0-AD28-DA7AC7846E18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA81D5C7-46C8-4F0E-9550-D240DC0366F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4BBE066-33C4-4410-85D3-4B77B3773330", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FB53D61-6C69-4A4A-92B1-C10D0B8F0EC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F6304BE-DAEE-49AB-B0B1-CEE6878CBECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8218130C-4E7D-4FB9-976B-2351977C82D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "515BDC46-5A1C-4A94-816A-B4751BB1B58D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63442274-452B-4361-A2AD-2ACBD699B150", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3845683A-A4D2-422F-9736-D0D7A430555F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE0EA636-84E9-4DAA-BE39-DBA9D7B857F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA04F2DD-4D51-4D4F-B3C7-D5EFACAD6EFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "275C5686-5333-440F-8C85-8C2FB91FC2DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EA2A77C-86CE-48E1-87A4-A69895102D49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EC951AC-3538-4711-A034-6C1A94AD797F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0FE9EA6-6BCE-40F7-8AE8-173F7CDF3EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A63D33D-302A-428C-986F-FC3F83CE9C86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA37F2FC-8F75-4FEA-882D-87AD5CC1558E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFB42739-E503-44B2-A020-0DB2B8791A81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "17AD5875-B7D7-498B-9484-23049753133E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B1F532B-8EAF-4E66-9AF5-5EEFF5A0BC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EC2594C-6067-40BA-B8B2-AEC9B9C7922F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2C03EA2-34BF-4F86-A19C-2818788E092B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA3FB3E1-D7D3-424B-A207-D3C6F4365D12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to prevent legitimate clients from connecting to the MELSOFT transmission port (TCP/IP) by not closing a connection properly, which may lead to a denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad de Consumo Incontrolado de Recursos en Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU todas las versiones, R04/08/16/32/120(ES)CPU todas las versiones, R08/16/32/120SFCPU todas las versiones, R08/16/32/120PCPU todas las versiones, R08/16/32/120PSFCPU todas las versiones) permite a un atacante remoto no autentificado impedir que clientes leg\u00edtimos se conecten al puerto de transmisi\u00f3n de MELSOFT (TCP/IP) al no cerrar una conexi\u00f3n apropiadamente, lo que puede conllevar a una condici\u00f3n de denegaci\u00f3n de servicio (DoS)" } ], "id": "CVE-2021-20591", "lastModified": "2024-11-21T05:46:50.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-11T16:15:08.987", "references": [ { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU98060539/index.html" }, { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU98060539/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf" } ], "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }