Search criteria
14 vulnerabilities found for iu1-1m20-d_firmware by mitsubishielectric
CVE-2020-16226 (GCVE-0-2020-16226)
Vulnerability from nvd – Published: 2020-10-05 17:19 – Updated: 2024-09-17 00:25
VLAI?
Title
Mitsubishi Electric Multiple Products
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
Severity ?
No CVSS data available.
CWE
- CWE-342 - PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mitsubishi Electric | QJ71MES96 |
Affected:
all versions
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:37:54.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "QJ71MES96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71WS96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q06CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-VG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "R12CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD55UP06-V,",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "D55UP12-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71GN11-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71EN71",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71MT91",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78Gn(n=4,8,16,32,64)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHV",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHW",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-60",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-300",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-MT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-EIP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q03UDECPU",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDVCPU(n=03/04/06/13/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "QnUDPVCPU(n=04/06/13/2)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "LnCPU(-P)(n=02/06/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "L26CPU-(P)BT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "RnCPU(n=00/01/02)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 18 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnENCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnSFCPU (n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPSFCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5U(C)-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Serial number 17X**** or later: Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "Serial number 179**** and prior: Version 1.070 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UC-32M*/**-TS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UJ-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Version 1.000"
}
]
},
{
"product": "FX5-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-ENET/IP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-ADP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3GE-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-P502",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-CCLGN-MS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "IU1-1M20-D",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LE7-40GU-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT2000 Series GT21 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GS Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT1000 Series GT14 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GT25-J71GN13-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-F800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A8NCG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date August 2020 and prior"
}
]
},
{
"product": "FR-E800-EPA Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "FR-E800-EPB Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "Conveyor Tracking Application",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "APR-nTR3FH all versions"
},
{
"status": "affected",
"version": "APR-nTR6FH all versions"
},
{
"status": "affected",
"version": "APR-nTR12FH all versions"
},
{
"status": "affected",
"version": "APR-nTR20FH(n=1,2) all versions"
}
]
},
{
"product": "MR-JE-C",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "MR-J4-TM",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
],
"datePublic": "2020-09-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-05T17:19:17",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
},
"title": "Mitsubishi Electric Multiple Products",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2020-09-01T16:00:00.000Z",
"ID": "CVE-2020-16226",
"STATE": "PUBLIC",
"TITLE": "Mitsubishi Electric Multiple Products"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QJ71MES96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71WS96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q06CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-VG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "R12CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD55UP06-V,",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "D55UP12-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71GN11-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71EN71",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71MT91",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78Gn(n=4,8,16,32,64)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHV",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHW",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-60",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-300",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-MT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q03UDECPU",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDVCPU(n=03/04/06/13/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "QnUDPVCPU(n=04/06/13/2)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "LnCPU(-P)(n=02/06/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "L26CPU-(P)BT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=00/01/02)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 18 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnENCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnSFCPU (n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPSFCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5U(C)-**M*/**",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Serial number 17X**** or later: Version 1.210 and prior"
},
{
"version_affected": "\u003c",
"version_value": "Serial number 179**** and prior: Version 1.070 and prior"
}
]
}
},
{
"product_name": "FX5UC-32M*/**-TS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 1.210 and prior"
}
]
}
},
{
"product_name": "FX5UJ-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Version 1.000"
}
]
}
},
{
"product_name": "FX5-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-ENET/IP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-ADP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3GE-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-P502",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-CCLGN-MS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "IU1-1M20-D",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LE7-40GU-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT2000 Series GT21 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GS Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT1000 Series GT14 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GT25-J71GN13-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-F800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A8NCG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date August 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPA Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPB Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "Conveyor Tracking Application",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "APR-nTR3FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR6FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR12FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR20FH(n=1,2)",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-JE-C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-J4-TM",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
]
},
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-16226",
"datePublished": "2020-10-05T17:19:17.358565Z",
"dateReserved": "2020-07-31T00:00:00",
"dateUpdated": "2024-09-17T00:25:38.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5547 (GCVE-0-2020-5547)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Resource Management Errors
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Resource Management Errors",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:50",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Resource Management Errors"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5547",
"datePublished": "2020-03-16T01:25:50",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5546 (GCVE-0-2020-5546)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5546",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5546",
"datePublished": "2020-03-16T01:25:49",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.586Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5545 (GCVE-0-2020-5545)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to restrict access
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to restrict access",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5545",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to restrict access"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5545",
"datePublished": "2020-03-16T01:25:49",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5544 (GCVE-0-2020-5544)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- NULL Pointer Dereference
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.508Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NULL Pointer Dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5544",
"datePublished": "2020-03-16T01:25:48",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.508Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5543 (GCVE-0-2020-5543)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to manage sessions
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.557Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to manage sessions",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5543",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to manage sessions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5543",
"datePublished": "2020-03-16T01:25:48",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5542 (GCVE-0-2020-5542)
Vulnerability from nvd – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.579Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:47",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5542",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5542",
"datePublished": "2020-03-16T01:25:47",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.579Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-16226 (GCVE-0-2020-16226)
Vulnerability from cvelistv5 – Published: 2020-10-05 17:19 – Updated: 2024-09-17 00:25
VLAI?
Title
Mitsubishi Electric Multiple Products
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
Severity ?
No CVSS data available.
CWE
- CWE-342 - PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mitsubishi Electric | QJ71MES96 |
Affected:
all versions
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T13:37:54.189Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "QJ71MES96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71WS96",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q06CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q24DHCCPU-VG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "R12CCPU-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD55UP06-V,",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "D55UP12-V",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71GN11-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RJ71EN71",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LJ71E71-100",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "QJ71MT91",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78Gn(n=4,8,16,32,64)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHV",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RD78GHW",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-60",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2GACP620-300",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-MT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NZ2FT-EIP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "Q03UDECPU",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22081 and prior"
}
]
},
{
"product": "QnUDVCPU(n=03/04/06/13/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "QnUDPVCPU(n=04/06/13/2)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22031 and prior"
}
]
},
{
"product": "LnCPU(-P)(n=02/06/26)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "L26CPU-(P)BT",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "the first 5 digits of serial number 22051 and prior"
}
]
},
{
"product": "RnCPU(n=00/01/02)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 18 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnENCPU(n=04/08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 50 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "RnSFCPU (n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "RnPSFCPU(n=08/16/32/120)",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5U(C)-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Serial number 17X**** or later: Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "Serial number 179**** and prior: Version 1.070 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UC-32M*/**-TS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"lessThan": "Version 1.210 and prior",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "FX5UJ-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Version 1.000"
}
]
},
{
"product": "FX5-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-ENET/IP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-ADP",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3GE-**M*/**",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX3U-ENET-P502",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FX5-CCLGN-MS",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "IU1-1M20-D",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "LE7-40GU-L",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT2000 Series GT21 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GS Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GOT1000 Series GT14 Model",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "GT25-J71GN13-T2",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-F800-E Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "FR-A8NCG",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date August 2020 and prior"
}
]
},
{
"product": "FR-E800-EPA Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "FR-E800-EPB Series",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "Production date July 2020 and prior"
}
]
},
{
"product": "Conveyor Tracking Application",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "APR-nTR3FH all versions"
},
{
"status": "affected",
"version": "APR-nTR6FH all versions"
},
{
"status": "affected",
"version": "APR-nTR12FH all versions"
},
{
"status": "affected",
"version": "APR-nTR20FH(n=1,2) all versions"
}
]
},
{
"product": "MR-JE-C",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "MR-J4-TM",
"vendor": "Mitsubishi Electric",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
],
"datePublic": "2020-09-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-342",
"description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-05T17:19:17",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
],
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
},
"title": "Mitsubishi Electric Multiple Products",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2020-09-01T16:00:00.000Z",
"ID": "CVE-2020-16226",
"STATE": "PUBLIC",
"TITLE": "Mitsubishi Electric Multiple Products"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "QJ71MES96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71WS96",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q06CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q24DHCCPU-VG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "R12CCPU-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD55UP06-V,",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "D55UP12-V",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71GN11-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RJ71EN71",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LJ71E71-100",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "QJ71MT91",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78Gn(n=4,8,16,32,64)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHV",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RD78GHW",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-60",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2GACP620-300",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-MT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "NZ2FT-EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "Q03UDECPU",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22081 and prior"
}
]
}
},
{
"product_name": "QnUDVCPU(n=03/04/06/13/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "QnUDPVCPU(n=04/06/13/2)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22031 and prior"
}
]
}
},
{
"product_name": "LnCPU(-P)(n=02/06/26)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "L26CPU-(P)BT",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "the first 5 digits of serial number 22051 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=00/01/02)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 18 and prior"
}
]
}
},
{
"product_name": "RnCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnENCPU(n=04/08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 50 and prior"
}
]
}
},
{
"product_name": "RnSFCPU (n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "RnPSFCPU(n=08/16/32/120)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5U(C)-**M*/**",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Serial number 17X**** or later: Version 1.210 and prior"
},
{
"version_affected": "\u003c",
"version_value": "Serial number 179**** and prior: Version 1.070 and prior"
}
]
}
},
{
"product_name": "FX5UC-32M*/**-TS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "Version 1.210 and prior"
}
]
}
},
{
"product_name": "FX5UJ-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Version 1.000"
}
]
}
},
{
"product_name": "FX5-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-ENET/IP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-ADP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3GE-**M*/**",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX3U-ENET-P502",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FX5-CCLGN-MS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "IU1-1M20-D",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "LE7-40GU-L",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT2000 Series GT21 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GS Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GOT1000 Series GT14 Model",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "GT25-J71GN13-T2",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-F800-E Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "FR-A8NCG",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date August 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPA Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "FR-E800-EPB Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Production date July 2020 and prior"
}
]
}
},
{
"product_name": "Conveyor Tracking Application",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "APR-nTR3FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR6FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR12FH",
"version_value": "all versions"
},
{
"version_affected": "=",
"version_name": "APR-nTR20FH(n=1,2)",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-JE-C",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
},
{
"product_name": "MR-J4-TM",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
}
]
},
"source": {
"advisory": "ICSA-20-245-01",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-16226",
"datePublished": "2020-10-05T17:19:17.358565Z",
"dateReserved": "2020-07-31T00:00:00",
"dateUpdated": "2024-09-17T00:25:38.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5547 (GCVE-0-2020-5547)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Resource Management Errors
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Resource Management Errors",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:50",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Resource Management Errors"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5547",
"datePublished": "2020-03-16T01:25:50",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5546 (GCVE-0-2020-5546)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5546",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5546",
"datePublished": "2020-03-16T01:25:49",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.586Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5545 (GCVE-0-2020-5545)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to restrict access
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to restrict access",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:49",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5545",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to restrict access"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5545",
"datePublished": "2020-03-16T01:25:49",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5543 (GCVE-0-2020-5543)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Fails to manage sessions
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.557Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Fails to manage sessions",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5543",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Fails to manage sessions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5543",
"datePublished": "2020-03-16T01:25:48",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5544 (GCVE-0-2020-5544)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- NULL Pointer Dereference
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.508Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "NULL Pointer Dereference",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:48",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5544",
"datePublished": "2020-03-16T01:25:48",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.508Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-5542 (GCVE-0-2020-5542)
Vulnerability from cvelistv5 – Published: 2020-03-16 01:25 – Updated: 2024-08-04 08:30
VLAI?
Summary
Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
- Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mitsubishi Electric Corporation | Mitsubishi Electric MELQIC IU1 series |
Affected:
IU1-1M20-D firmware version 1.0.7 and earlier
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T08:30:24.579Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MELQIC IU1 series",
"vendor": "Mitsubishi Electric Corporation",
"versions": [
{
"status": "affected",
"version": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-16T01:25:47",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2020-5542",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MELQIC IU1 series",
"version": {
"version_data": [
{
"version_value": "IU1-1M20-D firmware version 1.0.7 and earlier"
}
]
}
}
]
},
"vendor_name": "Mitsubishi Electric Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/en/vu/JVNVU92370624/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU92370624/index.html"
},
{
"name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-004.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2020-5542",
"datePublished": "2020-03-16T01:25:47",
"dateReserved": "2020-01-06T00:00:00",
"dateUpdated": "2024-08-04T08:30:24.579Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}