CVE-2020-5668
Vulnerability from cvelistv5
Published
2020-11-20 03:30
Modified
2024-08-04 08:39
Severity ?
EPSS score ?
Summary
Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/vu/JVNVU95980140/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | Third Party Advisory, US Government Resource | |
vultures@jpcert.or.jp | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | Vendor Advisory | |
vultures@jpcert.or.jp | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU95980140/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mitsubishi Electric Corporation | MELSEC iQ-R |
Version: R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:39:25.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MELSEC iQ-R", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-17T11:15:29", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MELSEC iQ-R", "version": { "version_data": [ { "version_value": "R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier" } ] } } ] }, "vendor_name": "Mitsubishi Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "name": "https://jvn.jp/vu/JVNVU95980140/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5668", "datePublished": "2020-11-20T03:30:23", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:39:25.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"19\", \"matchCriteriaId\": \"6314D599-F0B6-4D42-A6F5-985F09BD1694\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A23F21-9C5F-4CB3-BA20-4195B2165D26\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"19\", \"matchCriteriaId\": \"CAB241EF-238E-44BF-8995-4DC2EC4DBF69\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CADF6528-4B25-4779-A06F-2C4DF91DAE90\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"19\", \"matchCriteriaId\": \"FD971E61-145F-425C-A5E0-788CA22A9464\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D753C47-ED9C-453F-AC1F-C50476BE61C0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"51\", \"matchCriteriaId\": \"17518878-FF10-498F-A506-93D76D5F6371\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDEEF15E-FE32-4610-9E14-891069573E4D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"51\", \"matchCriteriaId\": \"AFAE4231-9FC7-4744-8652-1AC0202C5298\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DAA2202-88D5-4329-BF51-0F18C350C45C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"51\", \"matchCriteriaId\": \"C4C99DED-CA7F-496A-ADDF-3B2C8D5D6792\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30016EA0-FB24-4382-8960-6A75D32C9BD7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"51\", \"matchCriteriaId\": \"B1D0609F-30CB-424B-890E-F9BDF8A6606F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAF6EB84-7D97-4606-A90F-9D443CBC4755\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"51\", \"matchCriteriaId\": \"BC00F22C-BFEF-41E9-9B49-9FDE2B0D5804\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EF7D08E-D3D1-48D4-9440-B94B7A2BD662\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"22\", \"matchCriteriaId\": \"E49CF5A5-8F0E-4E41-9B6F-15641CD32E29\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B185323A-C9E3-48A0-AD28-DA7AC7846E18\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"22\", \"matchCriteriaId\": \"844B3E94-7F24-4523-AE29-55D5C55D4A99\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4BBE066-33C4-4410-85D3-4B77B3773330\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"22\", \"matchCriteriaId\": \"15096442-7E6B-4846-9A8F-01023A54DFA0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F6304BE-DAEE-49AB-B0B1-CEE6878CBECE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"22\", \"matchCriteriaId\": \"4DE2946C-E8C0-4253-B84C-16A81767343E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"515BDC46-5A1C-4A94-816A-B4751BB1B58D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"25\", \"matchCriteriaId\": \"F94C8F7E-8626-434C-A699-99751BE9D60E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3845683A-A4D2-422F-9736-D0D7A430555F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"25\", \"matchCriteriaId\": \"2D993D0D-FA5B-4819-86C2-F182464CFFAF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA04F2DD-4D51-4D4F-B3C7-D5EFACAD6EFB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"25\", \"matchCriteriaId\": \"A7354680-CF1D-4CA6-BC3F-39DA0B621612\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EA2A77C-86CE-48E1-87A4-A69895102D49\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"25\", \"matchCriteriaId\": \"974AB564-75E3-4ADF-9F25-7DFDCFF4D03A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0FE9EA6-6BCE-40F7-8AE8-173F7CDF3EF6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"06\", \"matchCriteriaId\": \"42566660-1AD6-466C-B07C-D263F701774B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA37F2FC-8F75-4FEA-882D-87AD5CC1558E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"06\", \"matchCriteriaId\": \"732D97FD-3D80-43A6-B41A-3B3BFC09E152\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17AD5875-B7D7-498B-9484-23049753133E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"06\", \"matchCriteriaId\": \"B92974DE-CD79-470B-9308-6D4FEF1C689B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EC2594C-6067-40BA-B8B2-AEC9B9C7922F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"06\", \"matchCriteriaId\": \"A9DA8768-E0AD-4603-9C3C-AE7E02BEFBC9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA3FB3E1-D7D3-424B-A207-D3C6F4365D12\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"47\", \"matchCriteriaId\": \"C9EDD7F7-18C8-424E-9808-409080AAC764\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"47\", \"matchCriteriaId\": \"5EDC22E7-38B1-42DF-9F48-BAB477156B54\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA16A0DE-CBBD-4871-85C8-1F3AD7D2A074\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"07\", \"matchCriteriaId\": \"A35CD177-3A86-4E6A-99CE-089CCDD38A14\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC7B087E-9F37-4D35-90E3-3BAB91D4A69C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"47\", \"matchCriteriaId\": \"918EA7ED-100C-4A4B-B848-C41E0B821FE3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F31A6CCB-56E8-4C79-8121-B0DFAB4C32E1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"47\", \"matchCriteriaId\": \"E54F3518-DB4E-4DE1-B97D-37860CF88BAC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95224DAD-C888-451D-9A2B-F7583A5837B5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"47\", \"matchCriteriaId\": \"DDBD7FC5-859D-419E-BAAE-B4E58FDA0887\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E93B863-EDC2-4584-B998-A0CF23824037\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"47\", \"matchCriteriaId\": \"61EA2C4A-216B-42EB-BA67-70C060C25DAC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EB02306-42B5-46EA-AD6A-79041E36FA2A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11\", \"matchCriteriaId\": \"608DB833-3477-4596-80A5-99AE0A3A4993\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7B5FE39-4540-4A95-ABA8-15F8EA545DE1\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de consumo incontrolado de recursos en los m\\u00f3dulos de la serie iQ-R de MELSEC (R00/01/02CPU firmware versi\\u00f3n \u002719\u0027 y anteriores, R04/08/16/32/120 (ES) CPU firmware versi\\u00f3n \u002751\u0027 y anteriores, R08/16/32/120SFCPU firmware versi\\u00f3n \u002722\u0027 y anteriores, R08/16/32/120PCPU firmware versi\\u00f3n \u002725\u0027 y anterior, R08/16/32/120PSFCPU firmware versi\\u00f3n \u002706\u0027 y anterior, RJ71EN71 firmware versi\\u00f3n \u002747\u0027 y anterior, RJ71GF11-T2 firmware versi\\u00f3n \u002747\u0027 y anterior, RJ72GF15-T2 firmware versi\\u00f3n \u002707\u0027 y anterior, RJ71GP21-SX firmware versi\\u00f3n \u002747\u0027 y anterior, RJ71GP21S-SX firmware versi\\u00f3n \u002747\u0027 y anterior, y RJ71GN11-T2 firmware versi\\u00f3n \u002711\u0027 y anteriores) permite a un atacante remoto no autentificado provocar un error en una CPU y causar una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS) en la ejecuci\\u00f3n del programa y su comunicaci\\u00f3n, o causar una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS) en la comunicaci\\u00f3n a trav\\u00e9s de la unidad mediante la recepci\\u00f3n de un paquete SLMP especialmente dise\\u00f1ado\"}]", "id": "CVE-2020-5668", "lastModified": "2024-11-21T05:34:27.190", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2020-11-20T04:15:11.423", "references": "[{\"url\": \"https://jvn.jp/vu/JVNVU95980140/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/vu/JVNVU95980140/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2020-5668\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2020-11-20T04:15:11.423\",\"lastModified\":\"2024-11-21T05:34:27.190\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de consumo incontrolado de recursos en los m\u00f3dulos de la serie iQ-R de MELSEC (R00/01/02CPU firmware versi\u00f3n \u002719\u0027 y anteriores, R04/08/16/32/120 (ES) CPU firmware versi\u00f3n \u002751\u0027 y anteriores, R08/16/32/120SFCPU firmware versi\u00f3n \u002722\u0027 y anteriores, R08/16/32/120PCPU firmware versi\u00f3n \u002725\u0027 y anterior, R08/16/32/120PSFCPU firmware versi\u00f3n \u002706\u0027 y anterior, RJ71EN71 firmware versi\u00f3n \u002747\u0027 y anterior, RJ71GF11-T2 firmware versi\u00f3n \u002747\u0027 y anterior, RJ72GF15-T2 firmware versi\u00f3n \u002707\u0027 y anterior, RJ71GP21-SX firmware versi\u00f3n \u002747\u0027 y anterior, RJ71GP21S-SX firmware versi\u00f3n \u002747\u0027 y anterior, y RJ71GN11-T2 firmware versi\u00f3n \u002711\u0027 y anteriores) permite a un atacante remoto no autentificado provocar un error en una CPU y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en la ejecuci\u00f3n del programa y su comunicaci\u00f3n, o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en la comunicaci\u00f3n a trav\u00e9s de la unidad mediante la recepci\u00f3n de un paquete SLMP especialmente dise\u00f1ado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19\",\"matchCriteriaId\":\"6314D599-F0B6-4D42-A6F5-985F09BD1694\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A23F21-9C5F-4CB3-BA20-4195B2165D26\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19\",\"matchCriteriaId\":\"CAB241EF-238E-44BF-8995-4DC2EC4DBF69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CADF6528-4B25-4779-A06F-2C4DF91DAE90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19\",\"matchCriteriaId\":\"FD971E61-145F-425C-A5E0-788CA22A9464\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D753C47-ED9C-453F-AC1F-C50476BE61C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"51\",\"matchCriteriaId\":\"17518878-FF10-498F-A506-93D76D5F6371\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDEEF15E-FE32-4610-9E14-891069573E4D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"51\",\"matchCriteriaId\":\"AFAE4231-9FC7-4744-8652-1AC0202C5298\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DAA2202-88D5-4329-BF51-0F18C350C45C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"51\",\"matchCriteriaId\":\"C4C99DED-CA7F-496A-ADDF-3B2C8D5D6792\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30016EA0-FB24-4382-8960-6A75D32C9BD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"51\",\"matchCriteriaId\":\"B1D0609F-30CB-424B-890E-F9BDF8A6606F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF6EB84-7D97-4606-A90F-9D443CBC4755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"51\",\"matchCriteriaId\":\"BC00F22C-BFEF-41E9-9B49-9FDE2B0D5804\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EF7D08E-D3D1-48D4-9440-B94B7A2BD662\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"22\",\"matchCriteriaId\":\"E49CF5A5-8F0E-4E41-9B6F-15641CD32E29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B185323A-C9E3-48A0-AD28-DA7AC7846E18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"22\",\"matchCriteriaId\":\"844B3E94-7F24-4523-AE29-55D5C55D4A99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4BBE066-33C4-4410-85D3-4B77B3773330\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"22\",\"matchCriteriaId\":\"15096442-7E6B-4846-9A8F-01023A54DFA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F6304BE-DAEE-49AB-B0B1-CEE6878CBECE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"22\",\"matchCriteriaId\":\"4DE2946C-E8C0-4253-B84C-16A81767343E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"515BDC46-5A1C-4A94-816A-B4751BB1B58D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"25\",\"matchCriteriaId\":\"F94C8F7E-8626-434C-A699-99751BE9D60E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3845683A-A4D2-422F-9736-D0D7A430555F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"25\",\"matchCriteriaId\":\"2D993D0D-FA5B-4819-86C2-F182464CFFAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA04F2DD-4D51-4D4F-B3C7-D5EFACAD6EFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"25\",\"matchCriteriaId\":\"A7354680-CF1D-4CA6-BC3F-39DA0B621612\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA2A77C-86CE-48E1-87A4-A69895102D49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"25\",\"matchCriteriaId\":\"974AB564-75E3-4ADF-9F25-7DFDCFF4D03A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FE9EA6-6BCE-40F7-8AE8-173F7CDF3EF6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"06\",\"matchCriteriaId\":\"42566660-1AD6-466C-B07C-D263F701774B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA37F2FC-8F75-4FEA-882D-87AD5CC1558E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"06\",\"matchCriteriaId\":\"732D97FD-3D80-43A6-B41A-3B3BFC09E152\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17AD5875-B7D7-498B-9484-23049753133E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"06\",\"matchCriteriaId\":\"B92974DE-CD79-470B-9308-6D4FEF1C689B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC2594C-6067-40BA-B8B2-AEC9B9C7922F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"06\",\"matchCriteriaId\":\"A9DA8768-E0AD-4603-9C3C-AE7E02BEFBC9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3FB3E1-D7D3-424B-A207-D3C6F4365D12\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"47\",\"matchCriteriaId\":\"C9EDD7F7-18C8-424E-9808-409080AAC764\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"47\",\"matchCriteriaId\":\"5EDC22E7-38B1-42DF-9F48-BAB477156B54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA16A0DE-CBBD-4871-85C8-1F3AD7D2A074\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"07\",\"matchCriteriaId\":\"A35CD177-3A86-4E6A-99CE-089CCDD38A14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7B087E-9F37-4D35-90E3-3BAB91D4A69C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"47\",\"matchCriteriaId\":\"918EA7ED-100C-4A4B-B848-C41E0B821FE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31A6CCB-56E8-4C79-8121-B0DFAB4C32E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"47\",\"matchCriteriaId\":\"E54F3518-DB4E-4DE1-B97D-37860CF88BAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95224DAD-C888-451D-9A2B-F7583A5837B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"47\",\"matchCriteriaId\":\"DDBD7FC5-859D-419E-BAAE-B4E58FDA0887\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E93B863-EDC2-4584-B998-A0CF23824037\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"47\",\"matchCriteriaId\":\"61EA2C4A-216B-42EB-BA67-70C060C25DAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB02306-42B5-46EA-AD6A-79041E36FA2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11\",\"matchCriteriaId\":\"608DB833-3477-4596-80A5-99AE0A3A4993\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B5FE39-4540-4A95-ABA8-15F8EA545DE1\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/vu/JVNVU95980140/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/vu/JVNVU95980140/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.