Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
14 vulnerabilities found for iu1-1m20-d_firmware by mitsubishielectric
CVE-2020-16226 (GCVE-0-2020-16226)
Vulnerability from nvd – Published: 2020-10-05 17:19 – Updated: 2024-09-17 00:25
VLAI?
Title
Mitsubishi Electric Multiple Products
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
Severity ?
No CVSS data available.
CWE
- CWE-342 - PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mitsubishi Electric | QJ71MES96 |
Affected:
all versions
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Date Public ?
2020-09-01 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:37:54.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "QJ71MES96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71WS96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q06CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-VG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "R12CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD55UP06-V,",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "D55UP12-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71GN11-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71EN71",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71MT91",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78Gn(n=4,8,16,32,64)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHV",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHW",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-60",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-300",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-MT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-EIP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q03UDECPU",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDVCPU(n=03/04/06/13/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "QnUDPVCPU(n=04/06/13/2)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "LnCPU(-P)(n=02/06/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "L26CPU-(P)BT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "RnCPU(n=00/01/02)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 18 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnENCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnSFCPU (n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPSFCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5U(C)-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Serial number 17X**** or later: Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "Serial number 179**** and prior: Version 1.070 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UC-32M*/**-TS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UJ-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Version 1.000"
}
]
},
{
"product": "FX5-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-ENET/IP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-ADP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3GE-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-P502",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-CCLGN-MS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "IU1-1M20-D",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LE7-40GU-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT2000 Series GT21 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GS Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT1000 Series GT14 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GT25-J71GN13-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-F800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A8NCG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date August 2020 and prior"
}
]
},
{
"product": "FR-E800-EPA Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "FR-E800-EPB Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "Conveyor Tracking Application",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "APR-nTR3FH all versions"
},
{
"status": "affected",
"version": "APR-nTR6FH all versions"
},
{
"status": "affected",
"version": "APR-nTR12FH all versions"
},
{
"status": "affected",
"version": "APR-nTR20FH(n=1,2) all versions"
}
]
},
{
"product": "MR-JE-C",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "MR-J4-TM",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
],
"datePublic": "2020-09-01T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-05T17:19:17.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
},
"title": "Mitsubishi Electric Multiple Products",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2020-09-01T16:00:00.000Z",
"ID": "CVE-2020-16226",
"STATE": "PUBLIC",
"TITLE": "Mitsubishi Electric Multiple Products"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QJ71MES96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71WS96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q06CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-VG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "R12CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD55UP06-V,",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "D55UP12-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71GN11-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71EN71",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71MT91",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78Gn(n=4,8,16,32,64)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHV",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHW",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-60",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-300",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-MT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q03UDECPU",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDVCPU(n=03/04/06/13/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "QnUDPVCPU(n=04/06/13/2)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "LnCPU(-P)(n=02/06/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "L26CPU-(P)BT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=00/01/02)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 18 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnENCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnSFCPU (n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPSFCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5U(C)-**M*/**",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Serial number 17X**** or later: Version 1.210 and prior"
},
{
"version_affected": "\u003c",
"version_value": "Serial number 179**** and prior: Version 1.070 and prior"
}
]
}
},
{
"product_name": "FX5UC-32M*/**-TS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 1.210 and prior"
}
]
}
},
{
"product_name": "FX5UJ-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Version 1.000"
}
]
}
},
{
"product_name": "FX5-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-ENET/IP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-ADP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3GE-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-P502",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-CCLGN-MS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "IU1-1M20-D",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LE7-40GU-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT2000 Series GT21 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GS Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT1000 Series GT14 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GT25-J71GN13-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-F800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A8NCG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date August 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPA Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPB Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "Conveyor Tracking Application",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "APR-nTR3FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR6FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR12FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR20FH(n=1,2)",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-JE-C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-J4-TM",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
]
},
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-16226",
"datePublished": "2020-10-05T17:19:17.358Z",
"dateReserved": "2020-07-31T00:00:00.000Z",
"dateUpdated": "2024-09-17T00:25:38.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5547 (GCVE-0-2020-5547)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Resource Management Errors
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Resource Management Errors",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:50.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Resource Management Errors"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5547",
"datePublished": "2020-03-16T01:25:50.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5546 (GCVE-0-2020-5546)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5546",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5546",
"datePublished": "2020-03-16T01:25:49.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.586Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5545 (GCVE-0-2020-5545)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to restrict access
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to restrict access",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5545",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to restrict access"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5545",
"datePublished": "2020-03-16T01:25:49.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5544 (GCVE-0-2020-5544)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- NULL Pointer Dereference
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.508Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NULL Pointer Dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5544",
"datePublished": "2020-03-16T01:25:48.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.508Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5543 (GCVE-0-2020-5543)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to manage sessions
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.557Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to manage sessions",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5543",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to manage sessions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5543",
"datePublished": "2020-03-16T01:25:48.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5542 (GCVE-0-2020-5542)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.579Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:47.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5542",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5542",
"datePublished": "2020-03-16T01:25:47.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.579Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-16226 (GCVE-0-2020-16226)
Vulnerability from cvelistv5 – Published: 2020-10-05 17:19 – Updated: 2024-09-17 00:25
VLAI?
Title
Mitsubishi Electric Multiple Products
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
Severity ?
No CVSS data available.
CWE
- CWE-342 - PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mitsubishi Electric | QJ71MES96 |
Affected:
all versions
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Date Public ?
2020-09-01 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:37:54.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "QJ71MES96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71WS96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q06CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-VG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "R12CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD55UP06-V,",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "D55UP12-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71GN11-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71EN71",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71MT91",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78Gn(n=4,8,16,32,64)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHV",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHW",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-60",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-300",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-MT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-EIP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q03UDECPU",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDVCPU(n=03/04/06/13/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "QnUDPVCPU(n=04/06/13/2)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "LnCPU(-P)(n=02/06/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "L26CPU-(P)BT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "RnCPU(n=00/01/02)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 18 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnENCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnSFCPU (n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPSFCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5U(C)-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Serial number 17X**** or later: Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "Serial number 179**** and prior: Version 1.070 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UC-32M*/**-TS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UJ-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Version 1.000"
}
]
},
{
"product": "FX5-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-ENET/IP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-ADP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3GE-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-P502",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-CCLGN-MS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "IU1-1M20-D",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LE7-40GU-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT2000 Series GT21 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GS Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT1000 Series GT14 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GT25-J71GN13-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-F800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A8NCG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date August 2020 and prior"
}
]
},
{
"product": "FR-E800-EPA Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "FR-E800-EPB Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "Conveyor Tracking Application",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "APR-nTR3FH all versions"
},
{
"status": "affected",
"version": "APR-nTR6FH all versions"
},
{
"status": "affected",
"version": "APR-nTR12FH all versions"
},
{
"status": "affected",
"version": "APR-nTR20FH(n=1,2) all versions"
}
]
},
{
"product": "MR-JE-C",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "MR-J4-TM",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
],
"datePublic": "2020-09-01T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-05T17:19:17.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
},
"title": "Mitsubishi Electric Multiple Products",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2020-09-01T16:00:00.000Z",
"ID": "CVE-2020-16226",
"STATE": "PUBLIC",
"TITLE": "Mitsubishi Electric Multiple Products"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QJ71MES96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71WS96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q06CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-VG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "R12CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD55UP06-V,",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "D55UP12-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71GN11-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71EN71",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71MT91",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78Gn(n=4,8,16,32,64)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHV",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHW",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-60",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-300",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-MT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q03UDECPU",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDVCPU(n=03/04/06/13/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "QnUDPVCPU(n=04/06/13/2)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "LnCPU(-P)(n=02/06/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "L26CPU-(P)BT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=00/01/02)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 18 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnENCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnSFCPU (n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPSFCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5U(C)-**M*/**",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Serial number 17X**** or later: Version 1.210 and prior"
},
{
"version_affected": "\u003c",
"version_value": "Serial number 179**** and prior: Version 1.070 and prior"
}
]
}
},
{
"product_name": "FX5UC-32M*/**-TS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 1.210 and prior"
}
]
}
},
{
"product_name": "FX5UJ-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Version 1.000"
}
]
}
},
{
"product_name": "FX5-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-ENET/IP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-ADP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3GE-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-P502",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-CCLGN-MS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "IU1-1M20-D",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LE7-40GU-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT2000 Series GT21 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GS Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT1000 Series GT14 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GT25-J71GN13-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-F800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A8NCG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date August 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPA Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPB Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "Conveyor Tracking Application",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "APR-nTR3FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR6FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR12FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR20FH(n=1,2)",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-JE-C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-J4-TM",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
]
},
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-16226",
"datePublished": "2020-10-05T17:19:17.358Z",
"dateReserved": "2020-07-31T00:00:00.000Z",
"dateUpdated": "2024-09-17T00:25:38.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5547 (GCVE-0-2020-5547)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Resource Management Errors
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Resource Management Errors",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:50.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Resource Management Errors"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5547",
"datePublished": "2020-03-16T01:25:50.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5546 (GCVE-0-2020-5546)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5546",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5546",
"datePublished": "2020-03-16T01:25:49.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.586Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5545 (GCVE-0-2020-5545)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to restrict access
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to restrict access",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5545",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to restrict access"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5545",
"datePublished": "2020-03-16T01:25:49.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5544 (GCVE-0-2020-5544)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- NULL Pointer Dereference
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.508Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NULL Pointer Dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5544",
"datePublished": "2020-03-16T01:25:48.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.508Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5543 (GCVE-0-2020-5543)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to manage sessions
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.557Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to manage sessions",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5543",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to manage sessions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5543",
"datePublished": "2020-03-16T01:25:48.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5542 (GCVE-0-2020-5542)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.579Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:47.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5542",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5542",
"datePublished": "2020-03-16T01:25:47.000Z",
"dateReserved": "2020-01-06T00:00:00.000Z",
"dateUpdated": "2024-08-04T08:30:24.579Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}