Vulnerabilites related to mitsubishielectric - q03udecpu
cve-2019-6535
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106771 | vdb-entry, x_refsource_BID | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. |
Version: Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:21.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106771", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106771" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior.", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior." } ] } ], "datePublic": "2019-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "UNCONTROLLED RESOURCE CONSUMPTION (\u0027RESOURCE EXHAUSTION\u0027) CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-06T10:57:02", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "106771", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106771" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2019-01-29T00:00:00", "ID": "CVE-2019-6535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior.", "version": { "version_data": [ { "version_value": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNCONTROLLED RESOURCE CONSUMPTION (\u0027RESOURCE EXHAUSTION\u0027) CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "106771", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106771" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-6535", "datePublished": "2019-02-05T19:00:00Z", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2024-09-16T21:08:31.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-16226
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 | x_refsource_MISC |
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric | QJ71MES96 |
Version: all versions |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:54.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "QJ71MES96", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71WS96", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q06CCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q24DHCCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q24DHCCPU-VG", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "R12CCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD55UP06-V,", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "D55UP12-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RJ71GN11-T2", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RJ71EN71", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71E71-100", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LJ71E71-100", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71MT91", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78Gn(n=4,8,16,32,64)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78GHV", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78GHW", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2GACP620-60", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2GACP620-300", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2FT-MT", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2FT-EIP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q03UDECPU", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22081 and prior" } ] }, { "product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22081 and prior" } ] }, { "product": "QnUDVCPU(n=03/04/06/13/26)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22031 and prior" } ] }, { "product": "QnUDPVCPU(n=04/06/13/2)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22031 and prior" } ] }, { "product": "LnCPU(-P)(n=02/06/26)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22051 and prior" } ] }, { "product": "L26CPU-(P)BT", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22051 and prior" } ] }, { "product": "RnCPU(n=00/01/02)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 18 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnCPU(n=04/08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 50 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnENCPU(n=04/08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 50 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnSFCPU (n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RnPCPU(n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RnPSFCPU(n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5U(C)-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Serial number 17X**** or later: Version 1.210 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "Serial number 179**** and prior: Version 1.070 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FX5UC-32M*/**-TS", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 1.210 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FX5UJ-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 1.000" } ] }, { "product": "FX5-ENET", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5-ENET/IP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-ADP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3GE-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-L", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-P502", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5-CCLGN-MS", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "IU1-1M20-D", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LE7-40GU-L", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GOT2000 Series GT21 Model", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GS Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GOT1000 Series GT14 Model", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GT25-J71GN13-T2", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-A800-E Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-F800-E Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-A8NCG", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date August 2020 and prior" } ] }, { "product": "FR-E800-EPA Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date July 2020 and prior" } ] }, { "product": "FR-E800-EPB Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date July 2020 and prior" } ] }, { "product": "Conveyor Tracking Application", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "APR-nTR3FH all versions" }, { "status": "affected", "version": "APR-nTR6FH all versions" }, { "status": "affected", "version": "APR-nTR12FH all versions" }, { "status": "affected", "version": "APR-nTR20FH(n=1,2) all versions" } ] }, { "product": "MR-JE-C", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "MR-J4-TM", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "datePublic": "2020-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-05T17:19:17", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "source": { "advisory": "ICSA-20-245-01", "discovery": "UNKNOWN" }, "title": "Mitsubishi Electric Multiple Products", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2020-09-01T16:00:00.000Z", "ID": "CVE-2020-16226", "STATE": "PUBLIC", "TITLE": "Mitsubishi Electric Multiple Products" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QJ71MES96", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71WS96", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q06CCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q24DHCCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q24DHCCPU-VG", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "R12CCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD55UP06-V,", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "D55UP12-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RJ71GN11-T2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RJ71EN71", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71E71-100", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "LJ71E71-100", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71MT91", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78Gn(n=4,8,16,32,64)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78GHV", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78GHW", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2GACP620-60", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2GACP620-300", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2FT-MT", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2FT-EIP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q03UDECPU", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22081 and prior" } ] } }, { "product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22081 and prior" } ] } }, { "product_name": "QnUDVCPU(n=03/04/06/13/26)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22031 and prior" } ] } }, { "product_name": "QnUDPVCPU(n=04/06/13/2)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22031 and prior" } ] } }, { "product_name": "LnCPU(-P)(n=02/06/26)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22051 and prior" } ] } }, { "product_name": "L26CPU-(P)BT", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22051 and prior" } ] } }, { "product_name": "RnCPU(n=00/01/02)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 18 and prior" } ] } }, { "product_name": "RnCPU(n=04/08/16/32/120)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 50 and prior" } ] } }, { "product_name": "RnENCPU(n=04/08/16/32/120)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 50 and prior" } ] } }, { "product_name": "RnSFCPU (n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RnPCPU(n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RnPSFCPU(n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5U(C)-**M*/**", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Serial number 17X**** or later: Version 1.210 and prior" }, { "version_affected": "\u003c", "version_value": "Serial number 179**** and prior: Version 1.070 and prior" } ] } }, { "product_name": "FX5UC-32M*/**-TS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 1.210 and prior" } ] } }, { "product_name": "FX5UJ-**M*/**", "version": { "version_data": [ { "version_affected": "=", "version_value": "Version 1.000" } ] } }, { "product_name": "FX5-ENET", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5-ENET/IP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-ADP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3GE-**M*/**", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-L", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-P502", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5-CCLGN-MS", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "IU1-1M20-D", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "LE7-40GU-L", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GOT2000 Series GT21 Model", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GS Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GOT1000 Series GT14 Model", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GT25-J71GN13-T2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-A800-E Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-F800-E Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-A8NCG", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date August 2020 and prior" } ] } }, { "product_name": "FR-E800-EPA Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date July 2020 and prior" } ] } }, { "product_name": "FR-E800-EPB Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date July 2020 and prior" } ] } }, { "product_name": "Conveyor Tracking Application", "version": { "version_data": [ { "version_affected": "=", "version_name": "APR-nTR3FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR6FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR12FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR20FH(n=1,2)", "version_value": "all versions" } ] } }, { "product_name": "MR-JE-C", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "MR-J4-TM", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } } ] }, "vendor_name": "Mitsubishi Electric" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ] }, "source": { "advisory": "ICSA-20-245-01", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-16226", "datePublished": "2020-10-05T17:19:17.358565Z", "dateReserved": "2020-07-31T00:00:00", "dateUpdated": "2024-09-17T00:25:38.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24946
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU90895626/index.html | x_refsource_MISC | |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V; Mitsubishi Electric MELSEC-Q Series Q03UDECPU; Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V; Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G); Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS; Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC-L series L26CPU-(P)BT; Mitsubishi Electric MELIPC Series MI5122-VW |
Version: Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions "16" and prior Version: Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. "24061" and prior Version: Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. "24061" and prior Version: Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions Version: Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions Version: Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions Version: Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number "24051" and prior Version: Mitsubishi Electric MELIPC Series MI5122-VW firmware versions "05" and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.628Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU90895626/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V; Mitsubishi Electric MELSEC-Q Series Q03UDECPU; Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V; Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G); Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS; Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC-L series L26CPU-(P)BT; Mitsubishi Electric MELIPC Series MI5122-VW", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior" }, { "status": "affected", "version": "Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior" }, { "status": "affected", "version": "Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Resource Locking", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-19T22:41:30", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU90895626/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-24946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V; Mitsubishi Electric MELSEC-Q Series Q03UDECPU; Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V; Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G); Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS; Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC-L series L26CPU-(P)BT; Mitsubishi Electric MELIPC Series MI5122-VW", "version": { "version_data": [ { "version_value": "Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior" }, { "version_value": "Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior" }, { "version_value": "Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior" }, { "version_value": "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior" }, { "version_value": "Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior" }, { "version_value": "Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions" }, { "version_value": "Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions" }, { "version_value": "Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions" }, { "version_value": "Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior" }, { "version_value": "Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior" }, { "version_value": "Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Resource Locking" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU90895626/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU90895626/index.html" }, { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-24946", "datePublished": "2022-06-15T20:18:35", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-13555
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-19-311-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior. |
Version: Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:57:39.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-311-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior.", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior." } ] } ], "descriptions": [ { "lang": "en", "value": "In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-13T22:27:22", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-311-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-13555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior.", "version": { "version_data": [ { "version_value": "Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-19-311-01", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-19-311-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-13555", "datePublished": "2019-11-13T22:27:22", "dateReserved": "2019-07-11T00:00:00", "dateUpdated": "2024-08-04T23:57:39.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "831CD80D-C812-403D-BC2E-7721936610D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "946DA26E-A6B2-46F6-BA81-A92133124823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F39554-77CE-4D87-A6A3-0AF4FFFC1C2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "82399072-1B4D-46A4-A37C-FC706915B162", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04udpvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "413D7F26-E1A1-4930-A91C-144BEB81E93B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6EF53BB-1A67-4677-871A-CB73A7C58D42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04udvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "532F62A7-F9C9-4662-83EC-1DC8D3F1D180", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "96E8978F-B03D-4B1F-ABBA-D817E614286C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q100udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6CDCC0-5F21-4473-8056-010CA834294E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q100udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E58A172-EEAF-4211-9F3A-66CF57456AFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q50udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C2420E8-00B2-4A77-B066-C56C584D79EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q50udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "401FB06F-F2F8-4C1E-B36B-4E3E4007F772", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26dhccpu-ls_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99135DCE-0336-45B4-A04A-30EB50A6F96C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26dhccpu-ls:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A79557-71AA-466E-9E1E-EEE00B54386A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "270C6407-C62B-4C1F-BB26-FB8B4B5ACACA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "795ED888-B01E-4EBA-8FB5-42D196169761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26udpvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A0DC211-8C25-414B-A0DB-BD0AE23E5C7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "D392BED4-C8A7-4A66-8A59-E2B569696E79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26udvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA33FB8-3972-48B9-BED6-4AE8B3BF1636", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B48AD3F4-81A2-43D2-A8B6-F7630CF4E742", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q20udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1391E89B-9EF1-4AC1-A584-60580D354F6F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q20udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "1696B87B-AF68-4341-9E13-E2B25FEA623A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q13udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B710AC-076E-43F0-98C5-E3910113769D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q13udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD3ACF11-7E9F-45A0-B4C2-B804B3609791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q13udpvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5590E663-6C0D-4B73-AADB-6275B45A0D5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q13udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "661C0146-FCCC-45BE-9EF6-113BD227E546", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q13udvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B28F75E-64F0-4F8F-8C41-33AFC623BB4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q13udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "97BCF977-E6AE-443E-8348-F7E13830BC23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q10udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1788914-0097-425E-BA6E-4312C418F423", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q10udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "E92D0D5D-E6A0-4E5D-83D9-6653E816FEF5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06ccpu-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FFA9E2E-5269-431E-8BF2-311064CEC289", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06ccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "E517BA2F-CF39-49C2-A68E-64A2CE17DBDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06phcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BE0617-11A9-45E8-A08B-C07ED0F13FC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06phcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "209C8EA9-FCF9-4328-ABFC-39E9AD3DED33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06udehcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "799930EB-89C4-4CA9-B4FD-4B2D7887E127", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "210FBF45-F646-4179-8139-E9022EA2E9AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06udpvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84E904FE-59D9-4D6F-9962-A6D8EF0678EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "052E37E0-9D05-4EB6-ADB3-B4465A19DC0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06udvcpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE7BC1E-1330-4DDF-8114-2B7BAD5839D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC119CA6-BFF3-4CFE-95E5-A10EEE52347F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E9318C-B3FA-43A5-8509-285FD1968D6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "125482D3-8FA3-4E80-BE4D-29C3C721C624", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02cpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1B0BC24-11B5-4174-8877-966FE4ED959D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02cpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC3E9C7-04C0-43F1-99B2-0C2471238A13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02scpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "739910FB-4D30-4E48-823A-778390DC7691", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02scpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC87459F-DB5E-4A5F-BFFC-B2026405F74B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02scpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A0F2373-BC92-42D8-A076-92B6AC32B3AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02scpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "61414DA7-87A6-421E-B75D-5D4283B54C41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l06cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B804C2-CF55-42C5-BBE2-2035C1FAEF58", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l06cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "63C8CF5F-FFDF-4403-96D0-46A7FECAC5E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l06cpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23DAE700-6C44-4DB6-83F0-1FC4C687B8F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l06cpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "961B56BC-F78C-44CC-885E-3451DFDF29EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1BC66-A107-4ADA-B0EE-82C71CFEC105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "1884BE8D-FFCD-4089-9F0B-519C8F570FCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-\\(p\\)bt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D36C5DC5-6A0E-41A1-A24F-CE53ADEED427", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-\\(p\\)bt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE019E69-01F5-4AC8-BE72-48A7B0FD0C56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-bt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15080C41-2C1F-46E8-920A-EDAE23E6CCB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-bt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3966C103-5181-49E3-878F-A0AF9F1DBA76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-bt-cm_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C758984-3178-4316-8E0C-3F4BB2CE598E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-bt-cm:-:*:*:*:*:*:*:*", "matchCriteriaId": "553A2CEB-5528-4A9E-800E-D91E5A3C49AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "361DEFFD-40FD-4B5F-ACFC-A62C165D4072", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD2A6CD-32DE-49F0-89F4-C130F0809766", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-pbt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C3C588A-1BFF-47B5-A658-EAF93F437E8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-pbt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60BE93D-B60D-4F45-ACD3-7B64C0C45D83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery." }, { "lang": "es", "value": "Una vulnerabilidad de bloqueo de recursos inapropiado en las versiones de firmware \"16\" y anteriores de Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V, Mitsubishi Electric MELSEC-Q Series Q03UDECPU los primeros 5 d\u00edgitos del n\u00famero de serie \"24061\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU los primeros 5 d\u00edgitos del n\u00famero de serie \"24061\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU los 5 primeros d\u00edgitos del n\u00famero de serie \"24051\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU los 5 primeros d\u00edgitos del n\u00famero de serie \"24051\" y anteriores, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V todas las versiones, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) todas las versiones, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS todas las versiones, Mitsubishi Electric MELSEC-L serie L02/06/26CPU(-P) los primeros 5 d\u00edgitos del n\u00famero de serie \"24051\" y anteriores, Mitsubishi Electric MELSEC-L serie L26CPU-(P)BT los primeros 5 d\u00edgitos del n\u00famero de serie \"24051\" y anteriores y Mitsubishi Electric MELIPC serie MI5122-VW versiones de firmware \"05\" y anteriores permiten que un atacante remoto no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en las comunicaciones Ethernet mediante el env\u00edo de paquetes especialmente dise\u00f1ados. Es requerido un reinicio del sistema de los productos para la recuperaci\u00f3n." } ], "id": "CVE-2022-24946", "lastModified": "2024-11-21T06:51:26.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-15T21:15:09.333", "references": [ { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU90895626/index.html" }, { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01" }, { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU90895626/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf" } ], "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-667" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106771 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106771 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q03udvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3F6589C-3572-42CC-B880-5B2C3549474C", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q03udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "0084E961-8F69-4EFE-A40E-1CF9A06453E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04udvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87073025-987A-4BEF-964E-883C8E7756DA", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "96E8978F-B03D-4B1F-ABBA-D817E614286C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06udvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE0FDFA3-0ED9-4021-8D72-C4F69B6B3459", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC119CA6-BFF3-4CFE-95E5-A10EEE52347F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q13udvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28EC5DB9-D294-4B47-80A8-DD22150A95B4", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q13udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "97BCF977-E6AE-443E-8348-F7E13830BC23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26udvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "689E8111-2B67-4032-8B63-668FF0EDEDFD", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B48AD3F4-81A2-43D2-A8B6-F7630CF4E742", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04udpvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE674A26-ADB7-46F1-8732-E349B36FB19D", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6EF53BB-1A67-4677-871A-CB73A7C58D42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06udpvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15597B31-88EF-46AC-8FED-C3F0FD2D7BB7", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "052E37E0-9D05-4EB6-ADB3-B4465A19DC0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q13udpvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BC22445-3EF3-4C25-8D0D-9168D24BA6E3", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q13udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "661C0146-FCCC-45BE-9EF6-113BD227E546", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26udpvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6DEC53B-5BCF-463B-A9B2-33E8BDE6E62C", "versionEndIncluding": "20081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "D392BED4-C8A7-4A66-8A59-E2B569696E79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F243D37-4DEB-4417-B293-A744752A21CB", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "946DA26E-A6B2-46F6-BA81-A92133124823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B073F2B0-FBED-4D2D-B162-E3AF4BAFE2AD", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "82399072-1B4D-46A4-A37C-FC706915B162", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "405F5551-5878-4EC2-98F2-2C8738367CBB", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "210FBF45-F646-4179-8139-E9022EA2E9AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q10udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30FA774C-8EA6-4276-AE24-DC77C9759D3B", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q10udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "E92D0D5D-E6A0-4E5D-83D9-6653E816FEF5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q13udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDA2969A-877C-44DF-8493-38F573D5F866", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q13udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD3ACF11-7E9F-45A0-B4C2-B804B3609791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q20udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D93EF2BD-FDFB-4475-9E4F-73235AE5FF24", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q20udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "1696B87B-AF68-4341-9E13-E2B25FEA623A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q26udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "432285C7-DD4C-4C7F-AF98-3ED9D3F68185", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q26udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "795ED888-B01E-4EBA-8FB5-42D196169761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q50udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7844E75B-B110-4BD6-A01B-8A71317604D0", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q50udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "401FB06F-F2F8-4C1E-B36B-4E3E4007F772", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q100udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "943C4F6E-AE15-4CB1-A4DE-E94E5FCFFB71", "versionEndIncluding": "20101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q100udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E58A172-EEAF-4211-9F3A-66CF57456AFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash." }, { "lang": "es", "value": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: n\u00famero de serie 20081 y anteriores, Q04/06/13/26UDPVCPU: n\u00famero de serie 20081 y anteriores y Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: n\u00famero de serie 20101 y anteriores. Un atacante remoto puede mandar bites espec\u00edficos a trav\u00e9s del puerto 5007 que resultar\u00e1 en un cierre inesperado de la pila de ethernet." } ], "id": "CVE-2019-6535", "lastModified": "2024-11-21T04:46:38.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-05T19:29:00.243", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106771" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71mes96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C7DBDF-F467-4310-8B65-EF611692202F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71mes96:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E9566C3-CFB4-4658-AFAE-ADD1B9DA9211", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71ws96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4AB29EE-605F-4140-A84F-B82E7762D826", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71ws96:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39BAAFF-FF1F-4279-B501-E0A918CC54CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06ccpu-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED3CA2D-EE3F-4281-883F-4A7FCB4CEE3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06ccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "E517BA2F-CF39-49C2-A68E-64A2CE17DBDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E848004-A141-4C9F-9A6C-73A3BD7A6082", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "210A2E8A-BF20-43F5-BA07-CB662833DE1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-vg_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1FC6B1-F265-4565-95A7-1F3F55634C17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-vg:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DF6F77-EEB5-4CB3-B041-7BA43F16E2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56BCED50-FEC2-4F26-81AC-0C3C9BD12C4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r12ccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B938943-DDD5-43DC-98A3-29D0E6AFBF85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd55up06-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF1853A1-8C0D-4EC0-BECC-A89D1CEFDFE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd55up06-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1F5EF13-A273-459E-815B-F21C57D44204", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd55up12-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E5CCD36-42A4-4B7C-B5E1-23F6E4BB1DAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd55up12-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED862A7-87F7-4548-B2AB-2A3DB3ED1482", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3F3EDD1-A50F-4581-96D7-9577F9836574", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5FE39-4540-4A95-ABA8-15F8EA545DE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B038D8DD-BE83-4AEB-96DF-FAF9EA630222", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BAF2D41-713E-4EA6-A705-57963DBF1309", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD1EB30-B1FC-49CC-97D7-739AA5E92E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:lj71e71-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFBF46E0-7580-48ED-AB04-490204FBBA33", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:lj71e71-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF312DE0-1882-41A2-A2F6-BA4CB71837E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71mt91_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BC6EE26-1644-45F7-8489-B6380FC493F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71mt91:-:*:*:*:*:*:*:*", "matchCriteriaId": "58095D28-F44C-4876-9B6F-6D1CFD3D602A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd78gn\\(n\\=4\\,8\\,16\\,32\\,64\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8B55521-A137-4A7F-839E-1B3DBCB7E313", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd78gn\\(n\\=4\\,8\\,16\\,32\\,64\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FE041A8C-11A7-4FAB-A363-49F429AEF24A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd78ghv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DCA431-9DA7-48B5-9107-86CA9DAD360E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd78ghv:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E5533D-15A8-471B-899B-FE9F9655EE8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd78ghw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B9722D1-BAB9-4E43-8612-4B6496DD1AF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd78ghw:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B5C3119-7579-4623-8513-65A281BDF0D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2gacp620-60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5A3B553-08E8-4415-BDAF-897181D5B11A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2gacp620-60:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFB0F4E4-F634-4D0C-A693-AC48962C320B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2gacp620-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E791C3F4-D449-4B3B-B07D-A683D621B6A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2gacp620-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABDD7EA6-1946-46DB-AD2B-2F778AB11AA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2ft-mt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "071EB002-B837-48B0-8276-A8B0AA5D578E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2ft-mt:-:*:*:*:*:*:*:*", "matchCriteriaId": "713AE73B-463A-4B2B-8B35-64FB0D53B416", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2ft-eip_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40F04BC6-17EA-4F6F-BB5B-C87FEE3CB59B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2ft-eip:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5CF34B6-9CCF-491C-A327-A38D0BAC504D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37E5D21A-8561-45FE-88E1-725D3488AA22", "versionEndIncluding": "22081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "946DA26E-A6B2-46F6-BA81-A92133124823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qnudehcpu\\(n\\=04\\/06\\/10\\/13\\/20\\/26\\/50\\/100\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503A8334-5C68-440E-B76D-5B834557C999", "versionEndIncluding": "22081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qnudehcpu\\(n\\=04\\/06\\/10\\/13\\/20\\/26\\/50\\/100\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "94A82925-8D77-4914-924A-350CF77857A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qnudvcpu\\(n\\=03\\/04\\/06\\/13\\/26\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57284400-F051-4E3A-B019-B308EF4F4997", "versionEndIncluding": "22031", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qnudvcpu\\(n\\=03\\/04\\/06\\/13\\/26\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "745BC528-D8A3-4393-A267-0A4E2FB81603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qnudpvcpu\\(n\\=04\\/06\\/13\\/2\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9EE5B71-EEAB-47E4-BCAB-1E81C40686B5", "versionEndIncluding": "22031", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qnudpvcpu\\(n\\=04\\/06\\/13\\/2\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "6136D778-C9AB-49C2-A90C-9281B34308EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:lncpu\\(-p\\)\\(n\\=02\\/06\\/26\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACB71CE-71B7-442C-A44F-B9DF138C45F7", "versionEndIncluding": "22051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:lncpu\\(-p\\)\\(n\\=02\\/06\\/26\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC9C7BE-9D93-477D-B560-EAB4367A4844", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-\\(p\\)bt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAF171-F382-4393-A326-D43D8F8BB55B", "versionEndIncluding": "22051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-\\(p\\)bt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE019E69-01F5-4AC8-BE72-48A7B0FD0C56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rncpu\\(n\\=00\\/01\\/02\\)t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D83880E-6DBE-4D64-B467-744F89C42743", "versionEndIncluding": "18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rncpu\\(n\\=00\\/01\\/02\\)t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E83D77-A204-406C-AC54-CB97A66090C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rncpu\\(n\\=04\\/08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4AF8ADC-ED05-43D2-AF6D-868737E4D1A8", "versionEndIncluding": "50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rncpu\\(n\\=04\\/08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "0B2EE57C-3023-4071-BE28-8B42BD181EA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnencpu\\(n\\=04\\/08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6937B45E-B23C-4DE1-A926-3529B4154A03", "versionEndIncluding": "50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnencpu\\(n\\=04\\/08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "48C947EF-B119-440B-A47A-0B84A0087D30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnsfcpu_\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7ABBACF-10F8-4729-8D3A-A9C5BDB961A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnsfcpu_\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "C5CDD376-A0AD-4924-89F1-F04EBCA9C020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnpcpu\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E575079C-E69B-4A10-86F4-3440F9BAEBCE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnpcpu\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "1A5ABD37-C45D-4D7E-A93B-F9EA2544BA9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnpsfcpu\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B6D8B2-6E4F-437D-95A4-A24BFBFF7350", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnpsfcpu\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "586B69F2-7276-437F-A69C-30B26ECB6B18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/d_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "F319764C-436E-4B29-9224-4A9BFAB21A7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBFA917-5DCF-4B0C-8C32-AC384FB880AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "7F895CD0-E081-49AB-84F9-B5F7C60921A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFE160B-32CC-4529-AD35-7467A32B609E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/ds-ts_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "616147FF-B8C0-45DA-B398-B0C15C44BAAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/ds-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4B64FFA-59CE-46E9-B240-F083B332BFD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss-ts_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "BD5D4DAB-0262-4D99-8164-1BF5FC36B8B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "2122A970-5A7D-40A6-BB97-622B695713ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "BBE714C4-7121-43BD-894B-274F25F01BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F4BA009-4F0A-427C-9D4A-F8A128F5F8C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mr\\/ds-ts_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "B7A24D5B-FE5C-4263-A313-0EE0A6B13E41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mr\\/ds-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "6319D639-CC7B-414E-9DCB-F9D427E8FEF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "78F21B67-1550-4575-A6ED-342903CDB8D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B284B91-7571-4614-A721-676D1972E2D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/ess_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "653A0628-9267-4C71-AB2C-D89107171D37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D8A69D9-DE42-4953-AD81-40EF7A003823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "8A5F3391-4B93-442F-857E-2B8717E93360", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B0AA6C3-68CC-454B-A959-707BB20F4E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "4C0617ED-28FF-4D7A-B246-F23292699021", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ED5C2F9-C203-40FD-B15C-F91A68FA0DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/ess_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "1A895C09-2DD4-451F-85A2-A77AE1CA36EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A38E527-6290-49AE-885A-21C4FC77EE96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "5A4B25D0-D814-42F5-A91A-A7DFF9D6E1ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CAF8ED8-B265-4FC5-91AE-CFA4C282E27F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "0C56BC76-12CB-4B1C-A3D1-004DD311110B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F5B2760-4E56-4FAA-A723-BB7CC28FAFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/ess_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "B9705681-362F-4F8E-BC42-884A58C3A042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7625B11E-0A91-46D2-8952-AC0BA956D7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1AC602-30AB-461B-A2BF-5310A33C36F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet:-:*:*:*:*:*:*:*", "matchCriteriaId": "1050809B-A058-451E-A62B-2E1707B3887E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet\\/ip_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F30B0C7E-D11C-4BD8-A864-E6614DC79B0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet\\/ip:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF5786BC-2E60-45A5-AD11-21CCAAFDDAAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet-adp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86E3E631-A5CB-48EF-ACDF-5D936E20E517", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet-adp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5DA247C-6A4B-4813-BABE-9420919C69EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD5F9558-9BE3-4798-8676-0D547240FF8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FDA7E6C-BFBF-4D78-8552-B2B3E6D9987B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F009EDE-0541-4E03-964D-8729DFEC2D4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F172545-1962-4611-AF12-C626B0F765FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CE77F12-BB13-4E48-B047-4725B89544FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "5766FC7F-312E-466E-9D1D-2C3D834A2B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E250D61-D30E-4902-9A3E-C964E3972998", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BC58D73-605B-4656-A93F-015178A11776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E0F199-6BF9-469E-8531-F5855F4CAC0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "A13FA80E-2FCE-43EE-A5F9-01847762DE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C5D511-C2FB-48D6-9546-D20C8320098F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6709317-170A-4146-8D34-8A36BB46CAB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C46851F9-1EE9-409A-8651-87B3A37F2C8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA061AF-EC9E-4490-98B0-4397271B6AFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D96213-DF83-4985-BB51-B4ED181B338A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1374CFE-25E0-4357-B880-9C52BEE2219C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED616F78-DAAD-4F67-BEBE-3A14D6002650", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EEA4C4A-0191-4A2C-B56F-E70475910A03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5940C5A4-254F-4BBC-A65F-A7B07B61B1C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B69421D2-A453-43A8-A8D8-5E0B73F7B24A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D5F69E-3AB7-434A-9476-11A2D5C4C54C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BBBBCC7-AC22-49C0-B0C0-8D89E633AB74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "506ACCE1-28D0-4983-89F2-DC969D6C5EC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "24E0AE74-DF57-4461-9A91-11F31459EC68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7D2DA26-04D4-41AC-A00B-EE87780235B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBC7773-96DA-433A-ABB8-845B19168EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50FCB926-E9C4-49F1-B657-F7E009EEE307", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "010DBD73-40FF-4353-9D11-CE81C4D14EDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6CECFB-40F8-4B99-AF07-1FE874B7565C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB590D55-DA7F-4543-99AA-1A1979F73E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F7A4438-C9CB-46BB-B1ED-FE6069497A52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B69A0E1-E9FA-4C5C-810F-8D3CEC959C20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E0F199-6BF9-469E-8531-F5855F4CAC0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "A13FA80E-2FCE-43EE-A5F9-01847762DE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C5D511-C2FB-48D6-9546-D20C8320098F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6709317-170A-4146-8D34-8A36BB46CAB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C46851F9-1EE9-409A-8651-87B3A37F2C8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA061AF-EC9E-4490-98B0-4397271B6AFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D96213-DF83-4985-BB51-B4ED181B338A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1374CFE-25E0-4357-B880-9C52BEE2219C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED616F78-DAAD-4F67-BEBE-3A14D6002650", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EEA4C4A-0191-4A2C-B56F-E70475910A03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5940C5A4-254F-4BBC-A65F-A7B07B61B1C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B69421D2-A453-43A8-A8D8-5E0B73F7B24A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D5F69E-3AB7-434A-9476-11A2D5C4C54C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BBBBCC7-AC22-49C0-B0C0-8D89E633AB74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "506ACCE1-28D0-4983-89F2-DC969D6C5EC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "24E0AE74-DF57-4461-9A91-11F31459EC68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-32_mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43F233A3-B233-4112-93AA-6EA6638CBB77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-32_mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "16193E36-7987-45EB-AFBE-AFB360043E67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "686B0F97-14C8-48A6-A25F-DF3BC6A0DA07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1644E1-F748-46A3-8E09-FF5D53FD046F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A00A164-30D7-45BF-8CB4-00F18569F488", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8ACC832-E1EC-46DA-A2D1-CF1A3791A885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-p502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0044A99C-4DAD-4593-B329-C3FFE706F8A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-p502:-:*:*:*:*:*:*:*", "matchCriteriaId": "69BA96DC-C462-4286-AE0E-32D141017E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-cclgn-ms_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "671454B2-0474-479F-9F1E-EFCFAC01882E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-cclgn-ms:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE1B348-9F41-40EC-B1FC-D5919F332815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:iu1-1m20-d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "714615F1-05A9-4D62-8671-F76CD1380C5A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:iu1-1m20-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "680B7B83-9F76-4C1F-B87A-F7049A0C46E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:le7-40gu-l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E4FD707-55B1-4A9C-9528-694C1008316B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:le7-40gu-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "41477864-1A55-4547-936A-29D6504F0D3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:got2000_series_gt21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16EAF851-CD95-4DD7-9BA0-FBBE90F7339E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:got2000_series_gt21:-:*:*:*:*:*:*:*", "matchCriteriaId": "0873DFF7-9627-482D-A4A9-72F8E26ACBB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:got_simple_series_gs21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F5BF7B0-75CE-481B-88E3-248D47CC19F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:got_simple_series_gs21:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D30700D-F1DC-46B1-8785-7E24721264D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:got1000_series_gt14_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D68C2E9-3D0A-466B-9476-BE8110EC27E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:got1000_series_gt14:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3BD1AB4-3A3D-46CD-B613-3E3613AAA273", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:gt25-j71gn13-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44078605-B592-48CC-9F91-F1B745212D78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:gt25-j71gn13-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDCE2B83-0CBA-447A-8616-780301853AC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a820-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70F1DC9-4930-4A99-BAC7-20F391693641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a820-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "64F6D4E4-CFC1-4CD4-92B9-738A062612D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a840-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "689C466A-5CA6-4413-8BD6-CCFDBABC006A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a840-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD00D598-4BEA-4E9B-9558-E80E22683C2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a860-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC34BC7-C4E4-4D3B-BAD8-8A77F44AF205", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a860-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "75275274-2442-4372-B0DD-8AB50ABF08D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a842-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D3F579C-C934-4589-90C2-FA1132104726", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a842-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1615F6C9-3C1E-47F0-9B61-607DCBAE7B50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a862-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE896C56-DBD2-4050-9AB0-757F52FE0DBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a862-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "08BBF6C1-F3DC-4E07-91A8-82D99BCE7E68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f820-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B923961-A068-4BE4-9C4C-D4F05A8E4A76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f820-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD15A99-5F0A-49B7-82E4-59B1F8ADD94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f840-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B451C55F-DCCC-4C26-BB79-CDBFB9261B9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f840-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB7232B-97CB-4820-A418-2CFEF95CED04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f860-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2735CEBA-9D80-4068-80D4-C5E2B46EB20E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f860-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDDBB50-1EAF-47E1-9DF0-9BA9433F3D47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f842-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FDBDB8D-4019-462E-9D5D-FE5BB57B2F13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f842-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAE513C7-3A83-4B34-A986-016F0AD5216C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f862-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFE7D90D-4E2D-4E62-83ED-CEEC9BC58378", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f862-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "287546A0-141B-4A76-9B04-6914FF31B1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a8ncge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6DD95FF-BA97-45E9-86E5-A1ED73395759", "versionEndIncluding": "2020-08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a8ncge:-:*:*:*:*:*:*:*", "matchCriteriaId": "99159924-7D0D-4E0D-A212-1B997A58B791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-e800-epa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD834CCD-0D6A-4BA7-8CF1-CE3F358D80DD", "versionEndIncluding": "2020-07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-e800-epa:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D9C957-5A2F-46EC-B82C-6C0A36EB4A3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-e800-epb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "753A00F4-4E1C-400D-969C-CB187DE76467", "versionEndIncluding": "2020-07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-e800-epb:-:*:*:*:*:*:*:*", "matchCriteriaId": "A448590A-35B3-4DB5-AEE6-5EBAE325920F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr12fh:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D0905-EEF6-4386-BE37-C138A722D04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr20fh\\(n\\=1\\,2\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "F0AF6F96-A8F3-4F1C-8BF6-BFADE4ECC872", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr3fh:*:*:*:*:*:*:*:*", "matchCriteriaId": "D72D7D59-109B-4DD5-A59F-2D93D97FD69A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr6fh:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF939B93-2A02-4879-943E-29FB45173F1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:mr-je-c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "449AF664-6DF7-46D5-8508-CA59D7BD9661", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:mr-je-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C350628-57BA-4E37-A15D-0B19FBE423AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:mr-j4-tm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C702434-90C9-47B2-B9EF-F9AFD847D8D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:mr-j4-tm:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B10997-62CF-4512-ABB2-A679E77245AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." }, { "lang": "es", "value": "M\u00faltiples productos de Mitsubishi Electric, son vulnerables a suplantaciones de un dispositivo leg\u00edtimo por parte de un actor malicioso, lo que puede permitir a un atacante ejecutar comandos arbitrarios remotamente" } ], "id": "CVE-2020-16226", "lastModified": "2024-11-21T05:06:58.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-05T18:15:13.133", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-342" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-19-311-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-19-311-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q03\\/04\\/06\\/13\\/26udvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3FFA52F-3934-465F-B9E6-615ABE53DCE2", "versionEndIncluding": "21081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q03\\/04\\/06\\/13\\/26udvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "BADFAFAD-D3A2-4802-BB8B-46340D3D9550", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04\\/06\\/13\\/26udpvcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73DD8BA5-CFE9-4CE2-9FB4-03588EA7CE76", "versionEndIncluding": "21081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04\\/06\\/13\\/26udpvcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44F9695-BD0E-48E8-B0B4-5BF6DF07B612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C9E2B6C-0039-447A-8513-01D84C44AC06", "versionEndIncluding": "21081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "946DA26E-A6B2-46F6-BA81-A92133124823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q04\\/06\\/10\\/13\\/20\\/26\\/50\\/100udehcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "092CBA40-1034-4E91-9576-01895AF686ED", "versionEndIncluding": "21081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q04\\/06\\/10\\/13\\/20\\/26\\/50\\/100udehcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C545FF-8695-4F1C-BAD7-EFF6731908D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02\\/06\\/26cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AF8CDCC-8A45-449B-84A7-417ADF536199", "versionEndIncluding": "21101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02\\/06\\/26cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "9358A26E-5619-429F-B446-D6F7E9914889", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-bt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33C33950-5B33-4315-88D9-4B8107847ECD", "versionEndIncluding": "21101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-bt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3966C103-5181-49E3-878F-A0AF9F1DBA76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02\\/06\\/26cpu-p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BFAA052-A72F-401D-91BC-6D8276A11D6D", "versionEndIncluding": "21101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02\\/06\\/26cpu-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "069CB556-4AEB-43E0-91AC-1A69F2C833D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-pbt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F529865-DB4B-4A94-B950-79F01D92F7CB", "versionEndIncluding": "21101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-pbt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60BE93D-B60D-4F45-ACD3-7B64C0C45D83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l02\\/06\\/26cpu-cm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9CE2836-0F6F-4C78-A5EC-547E9409E31E", "versionEndIncluding": "21101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l02\\/06\\/26cpu-cm:-:*:*:*:*:*:*:*", "matchCriteriaId": "93AE7089-00AD-412A-82F5-892421130C18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-bt-cm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9A4ABB1-4BEA-474A-9215-968825B12B7A", "versionEndIncluding": "21101", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-bt-cm:-:*:*:*:*:*:*:*", "matchCriteriaId": "553A2CEB-5528-4A9E-800E-D91E5A3C49AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules." }, { "lang": "es", "value": "En Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: n\u00famero de serie 21081 y anterior, Q04/06/13/26UDPVCPU: n\u00famero de serie 21081 y anterior, y Q04/06/10/13/20/26/50/100UDEHCPU: n\u00famero de serie 21081 y anterior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: n\u00famero de serie 21101 y anterior, L02/06/26CPU-P, L26CPU-PBT: n\u00famero de serie 21101 y anterior, y L02/06/26CPU-CM, L26CPU-BT-CM: n\u00famero de serie 21101 y anterior, un atacante remoto puede causar que el servicio FTP ingrese en una condici\u00f3n de denegaci\u00f3n de servicio dependiendo de la sincronizaci\u00f3n en la que un atacante remoto conecta con el Servidor FTP en los m\u00f3dulos de CPU anteriores." } ], "id": "CVE-2019-13555", "lastModified": "2024-11-21T04:25:08.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-13T23:15:11.327", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-311-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-311-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201902-0127
Vulnerability from variot
Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash. plural Mitsubishi Electric Q Series products are vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Mitsubishi Electric MELSEC-Q Series PLCs are prone to an remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Misubishi Electric Q03UDVCPU, etc. are all PLC (programmable logic controller) products of Japan's Mitsubishi Electric (Misubishi Electric) company. Security flaws exist in several Misubishi products. A remote attacker could exploit this vulnerability by sending a specially crafted packet to cause Ethernet to stop communicating. The following products are affected: Misubishi Q03UDVCPU; Q04UDVCPU; Q06UDVCPU; Q13UDVCPU; Q26UDPVCPU; Q03UDECPU;
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201902-0127", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "q26udpvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q06udpvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q04udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q10udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q13udpvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q03udecpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q13udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q20udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q100udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q26udvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q04udvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q03udvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q13udvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q06udvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q04udpvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20081" }, { "model": "q26udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q06udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q50udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "20101" }, { "model": "q03udecpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q03udvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q04udpvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q04udvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q06udpvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q06udvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q13udpvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q13udvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q26udpvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "q26udvcpu", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "electric q04/06/13/26udpvcpu", "scope": "eq", "trust": 0.3, "vendor": "mitsubishi", "version": "20081" }, { "model": "electric q04/06/10/13/20/26/50/100udehcpu", "scope": "eq", "trust": 0.3, "vendor": "mitsubishi", "version": "20101" }, { "model": "electric q03udecpu", "scope": "eq", "trust": 0.3, "vendor": "mitsubishi", "version": "20101" }, { "model": "electric q03/04/06/13/26udvcpu", "scope": "eq", "trust": 0.3, "vendor": "mitsubishi", "version": "20081" } ], "sources": [ { "db": "BID", "id": "106771" }, { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "NVD", "id": "CVE-2019-6535" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:mitsubishielectric:q03udecpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q03udvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q04udpvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q04udvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q06udpvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q06udvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q13udpvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q13udvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q26udpvcpu_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:mitsubishielectric:q26udvcpu_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001917" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tri Quach of Amazon???s Customer Fulfillment Technology Security (CFTS),Tri Quach of Amazon???s Customer Fulfillment Technology Security (CFTS)", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-973" } ], "trust": 0.6 }, "cve": "CVE-2019-6535", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-6535", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-157970", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-6535", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-6535", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6535", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-6535", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201901-973", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-157970", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-157970" }, { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "CNNVD", "id": "CNNVD-201901-973" }, { "db": "NVD", "id": "CVE-2019-6535" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash. plural Mitsubishi Electric Q Series products are vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Mitsubishi Electric MELSEC-Q Series PLCs are prone to an remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition. Misubishi Electric Q03UDVCPU, etc. are all PLC (programmable logic controller) products of Japan\u0027s Mitsubishi Electric (Misubishi Electric) company. Security flaws exist in several Misubishi products. A remote attacker could exploit this vulnerability by sending a specially crafted packet to cause Ethernet to stop communicating. The following products are affected: Misubishi Q03UDVCPU; Q04UDVCPU; Q06UDVCPU; Q13UDVCPU; Q26UDPVCPU; Q03UDECPU;", "sources": [ { "db": "NVD", "id": "CVE-2019-6535" }, { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "BID", "id": "106771" }, { "db": "VULHUB", "id": "VHN-157970" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6535", "trust": 2.8 }, { "db": "ICS CERT", "id": "ICSA-19-029-02", "trust": 2.8 }, { "db": "BID", "id": "106771", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-001917", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201901-973", "trust": 0.7 }, { "db": "SEEBUG", "id": "SSVID-98808", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-157970", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157970" }, { "db": "BID", "id": "106771" }, { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "CNNVD", "id": "CNNVD-201901-973" }, { "db": "NVD", "id": "CVE-2019-6535" } ] }, "id": "VAR-201902-0127", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-157970" } ], "trust": 0.85 }, "last_update_date": "2024-11-23T23:08:27.703000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSEC-Q\u30b7\u30ea\u30fc\u30ba", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/fa/products/cnt/plcq/items/index.html" }, { "title": "Multiple Misubishi Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89040" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "CNNVD", "id": "CNNVD-201901-973" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157970" }, { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "NVD", "id": "CVE-2019-6535" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-029-02" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/106771" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6535" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6535" }, { "trust": 0.3, "url": "http://www.mitsubishi-automation.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-157970" }, { "db": "BID", "id": "106771" }, { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "CNNVD", "id": "CNNVD-201901-973" }, { "db": "NVD", "id": "CVE-2019-6535" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-157970" }, { "db": "BID", "id": "106771" }, { "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "db": "CNNVD", "id": "CNNVD-201901-973" }, { "db": "NVD", "id": "CVE-2019-6535" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-02-05T00:00:00", "db": "VULHUB", "id": "VHN-157970" }, { "date": "2019-01-29T00:00:00", "db": "BID", "id": "106771" }, { "date": "2019-03-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "date": "2019-01-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-973" }, { "date": "2019-02-05T19:29:00.243000", "db": "NVD", "id": "CVE-2019-6535" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-31T00:00:00", "db": "VULHUB", "id": "VHN-157970" }, { "date": "2019-01-29T00:00:00", "db": "BID", "id": "106771" }, { "date": "2019-03-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001917" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-973" }, { "date": "2024-11-21T04:46:38.847000", "db": "NVD", "id": "CVE-2019-6535" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-973" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Mitsubishi Electric Q Vulnerability related to resource depletion in series products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001917" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-973" } ], "trust": 0.6 } }
var-202010-0395
Vulnerability from variot
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. of multiple Mitsubishi Electric products TCP A vulnerability in session management exists in the protocol stack. This vulnerability information is provided by the developer for the purpose of dissemination to product users. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Mitsubishi Electric gt14 model是日本三菱电机(Mitsubishi Electric)公司的一个用于工业生产过程中提供人机交互界面的设备. Mitsubishi Electric 多个产品存在命令执行漏洞,该漏洞允许攻击者冒充合法设备,从而使攻击者能够远程执行任意命令。以下产品和版本受到影响:QJ71MES96 all versions,QJ71WS96 all versions,Q06CCPU-V all versions,Q24DHCCPU-V all versions,Q24DHCCPU-VG all versions,R12CCPU-V Version 13 and prior,RD55UP06-V Version 09 and prior,RD55UP12-V Version 01,RJ71GN11-T2 Version 11 and prior,RJ71EN71 all versions,QJ71E71-100 all versions,LJ71E71-100 all versions,QJ71MT91 all versions,RD78Gn(n=4,8,16,32,64) all versions,RD78GHV all versions,RD78GHW all versions,NZ2GACP620-60 all versions,NZ2GACP620-300 all versions,NZ2FT-MT all versions,NZ2FT-EIP all versions,Q03UDECPU the first 5 digits of serial number 22081 and prior,QnUDEHCPU(n=04/06/10/13/20/26/50/100) the first 5 digits of serial number 22081 and prior,QnUDVCPU(n=03/04/06/13/26) the first 5 digits of serial number 22031 and prior,QnUDPVCPU(n=04/06/13/26) the first 5 digits of serial number 22031 and prior,LnCPU(-P)(n=02/06/26) the first 5 digits of serial number 22051 and prior,L26CPU-(P)BT the first 5 digits of serial number 22051 and prior,RnCPU(n=00/01/02) Version 18 and prior,RnCPU(n=04/08/16/32/120) Version 50 and prior,RnENCPU(n=04/08/16/32/120) Version 50 and prior,RnSFCPU (n=08/16/32/120) Version 22 and prior,RnPCPU(n=08/16/32/120) Version 24 and prior,RnPSFCPU(n=08/16/32/120) Version 05 and prior,FX5U(C)-M*/,FX5UC-32M/-TS Version 1.210 and prior,FX5UJ-M/ Version 1.000,FX5-ENET Version 1.002 and prior,FX5-ENET/IP Version 1.002 and prior,FX3U-ENET-ADP Version 1.22 and prior,FX3GE-M/* the first 3 digits of serial number 20X and prior,FX3U-ENET Version 1.14 and prior,FX3U-ENET-L Version 1.14 and prior,FX3U-ENET-P502 Version 1.14 and prior,FX5-CCLGN-MS Version 1.000,IU1-1M20-D all versions,LE7-40GU-L all versions,GOT2000 Series GT21 Model all versions,GS Series all versions,GOT1000 Series GT14 Model all versions,GT25-J71GN13-T2 all versions,FR-A800-E Series production date December 2020 and prior,FR-F800-E Series production date December 2020 and prior,FR-A8NCG Production date August 2020 and prior,FR-E800-EPA Series Production date July 2020 and prior,FR-E800-EPB Series Production date July 2020 and prior,Conveyor Tracking Application APR-nTR3FH APR-nTR6FH APR-nTR12FH APR-nTR20FH(n=1,2) all versions (Discontinued product),MR-JE-C all versions,MR-J4-TM all versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-0395", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fr-f842-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnpsfcpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qj71ws96", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-14mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f860-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "q24dhccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-24mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx3u-enet", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "q24dhccpu-vg", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnpcpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "got2000 series gt21", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-60mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5-enet-adp", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a860-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rd55up06-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uc-32mr\\/ds-ts", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "got1000 series gt14", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr12fh", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "rd78ghv", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f820-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f840-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qnudehcpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22081" }, { "model": "qnudpvcpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22031" }, { "model": "fx5uj-24mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "nz2gacp620-60", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnsfcpu \\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rj71en71", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5-enet", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a862-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qj71e71-100", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "mr-j4-tm", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "r12ccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "mr-je-c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-40mt\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx3g-32 mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qnudvcpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22031" }, { "model": "lj71e71-100", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-40mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx5uc-32mt\\/d", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "fx5uj-60mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx3g-14mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-14mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5-cclgn-ms", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a8ncge", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "2020-08" }, { "model": "qj71mt91", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a820-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-60mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fr-e800-epa", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "2020-07" }, { "model": "got simple series gs21", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-e800-epb", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "2020-07" }, { "model": "fx3g-14mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rj71gn11-t2", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "le7-40gu-l", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-40mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "iu1-1m20-d", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "nz2gacp620-300", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "l26cpu-\\ bt", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22051" }, { "model": "nz2ft-mt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "q06ccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f862-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr6fh", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3g-24mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rd78gn\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-24mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "lncpu\\ \\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22051" }, { "model": "fx3g-60mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr3fh", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-24mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr20fh\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3u-enet-l", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a842-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a840-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-60mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rd78ghw", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uc-32mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "rncpu\\ t", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "18" }, { "model": "fx3u-enet-p502", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "gt25-j71gn13-t2", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uc-32mt\\/ds-ts", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "q03udecpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22081" }, { "model": "fx5uj-60mt\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx5uc-32mt\\/dss-ts", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "fx5-enet\\/ip", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-60mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rncpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "50" }, { "model": "fx3g-24mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnencpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "50" }, { "model": "qj71mes96", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-24mt\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "rd55up12-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "nz2ft-eip", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "(multiple products)" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * ac the servo melservo" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * lossnay central ventilation system" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * display got" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * air conditioning control system / centralized controller" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * air conditioning control system / expansion controller" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * energy measurement unit" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "affected products s vary widely. for more information, please check the information provided by the developer." }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * range hood fan" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * data collection analyzer melqic" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * hems compatible adapter, lan adapter" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * air conditioning control system / bm adapter" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * room air conditioner" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * bath drying/heating/ventilation system" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * solar power system color monitor eco guide" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * ventilation fan for duct" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * tension controller" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * inverter freqrol" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * mitsubishi energy saving dem monitoring server e-energy" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * robot melfa" }, { "model": "melsec iq-f", "scope": null, "trust": 0.7, "vendor": "mitsubishi electric", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ta-Lun Yen of TXOne IoT/ICS Security Research Labs (Trend Micro)", "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" } ], "trust": 0.7 }, "cve": "CVE-2020-16226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-16226", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-16226", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2020-16226", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-16226", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-16226", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2020-16226", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-16226", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202009-074", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2020-16226", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. of multiple Mitsubishi Electric products TCP A vulnerability in session management exists in the protocol stack. This vulnerability information is provided by the developer for the purpose of dissemination to product users. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Mitsubishi Electric gt14 model\u662f\u65e5\u672c\u4e09\u83f1\u7535\u673a\uff08Mitsubishi Electric\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u7528\u4e8e\u5de5\u4e1a\u751f\u4ea7\u8fc7\u7a0b\u4e2d\u63d0\u4f9b\u4eba\u673a\u4ea4\u4e92\u754c\u9762\u7684\u8bbe\u5907. \nMitsubishi Electric \u591a\u4e2a\u4ea7\u54c1\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u653b\u51fb\u8005\u5192\u5145\u5408\u6cd5\u8bbe\u5907\uff0c\u4ece\u800c\u4f7f\u653b\u51fb\u8005\u80fd\u591f\u8fdc\u7a0b\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u4ee5\u4e0b\u4ea7\u54c1\u548c\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aQJ71MES96 all versions\uff0cQJ71WS96 all versions\uff0cQ06CCPU-V all versions\uff0cQ24DHCCPU-V all versions\uff0cQ24DHCCPU-VG all versions\uff0cR12CCPU-V Version 13 and prior\uff0cRD55UP06-V Version 09 and prior\uff0cRD55UP12-V Version 01\uff0cRJ71GN11-T2 Version 11 and prior\uff0cRJ71EN71 all versions\uff0cQJ71E71-100 all versions\uff0cLJ71E71-100 all versions\uff0cQJ71MT91 all versions\uff0cRD78Gn(n=4,8,16,32,64) all versions\uff0cRD78GHV all versions\uff0cRD78GHW all versions\uff0cNZ2GACP620-60 all versions\uff0cNZ2GACP620-300 all versions\uff0cNZ2FT-MT all versions\uff0cNZ2FT-EIP all versions\uff0cQ03UDECPU the first 5 digits of serial number 22081 and prior\uff0cQnUDEHCPU(n=04/06/10/13/20/26/50/100) the first 5 digits of serial number 22081 and prior\uff0cQnUDVCPU(n=03/04/06/13/26) the first 5 digits of serial number 22031 and prior\uff0cQnUDPVCPU(n=04/06/13/26) the first 5 digits of serial number 22031 and prior\uff0cLnCPU(-P)(n=02/06/26) the first 5 digits of serial number 22051 and prior\uff0cL26CPU-(P)BT the first 5 digits of serial number 22051 and prior\uff0cRnCPU(n=00/01/02) Version 18 and prior\uff0cRnCPU(n=04/08/16/32/120) Version 50 and prior\uff0cRnENCPU(n=04/08/16/32/120) Version 50 and prior\uff0cRnSFCPU (n=08/16/32/120) Version 22 and prior\uff0cRnPCPU(n=08/16/32/120) Version 24 and prior\uff0cRnPSFCPU(n=08/16/32/120) Version 05 and prior\uff0cFX5U(C)-**M*/**\uff0cFX5UC-32M*/**-TS Version 1.210 and prior\uff0cFX5UJ-**M*/** Version 1.000\uff0cFX5-ENET Version 1.002 and prior\uff0cFX5-ENET/IP Version 1.002 and prior\uff0cFX3U-ENET-ADP Version 1.22 and prior\uff0cFX3GE-**M*/** the first 3 digits of serial number 20X and prior\uff0cFX3U-ENET Version 1.14 and prior\uff0cFX3U-ENET-L Version 1.14 and prior\uff0cFX3U-ENET-P502 Version 1.14 and prior\uff0cFX5-CCLGN-MS Version 1.000\uff0cIU1-1M20-D all versions\uff0cLE7-40GU-L all versions\uff0cGOT2000 Series GT21 Model all versions\uff0cGS Series all versions\uff0cGOT1000 Series GT14 Model all versions\uff0cGT25-J71GN13-T2 all versions\uff0cFR-A800-E Series production date December 2020 and prior\uff0cFR-F800-E Series production date December 2020 and prior\uff0cFR-A8NCG Production date August 2020 and prior\uff0cFR-E800-EPA Series Production date July 2020 and prior\uff0cFR-E800-EPB Series Production date July 2020 and prior\uff0cConveyor Tracking Application APR-nTR3FH APR-nTR6FH APR-nTR12FH APR-nTR20FH(n=1,2) all versions (Discontinued product)\uff0cMR-JE-C all versions\uff0cMR-J4-TM all versions", "sources": [ { "db": "NVD", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "VULMON", "id": "CVE-2020-16226" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-16226", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-245-01", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU93926439", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-008251", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10966", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-1207", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3041", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.4767", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-074", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-16226", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "id": "VAR-202010-0395", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.41666666 }, "last_update_date": "2024-11-23T21:51:16.463000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "of our products TCP Spoofing Vulnerability in Protocol Stack", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-009.pdf" }, { "title": "Mitsubishi Electric has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" }, { "title": "mitsubishielectric Fixes for remote command execution vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=127702" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-342", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93926439/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3041/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16226" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.4767" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/342.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-245-01" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-08T00:00:00", "db": "ZDI", "id": "ZDI-20-1207" }, { "date": "2020-10-05T00:00:00", "db": "VULMON", "id": "CVE-2020-16226" }, { "date": "2020-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "date": "2020-09-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-074" }, { "date": "2020-10-05T18:15:13.133000", "db": "NVD", "id": "CVE-2020-16226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-17T00:00:00", "db": "ZDI", "id": "ZDI-20-1207" }, { "date": "2020-10-22T00:00:00", "db": "VULMON", "id": "CVE-2020-16226" }, { "date": "2022-09-26T08:55:00", "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "date": "2022-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-074" }, { "date": "2024-11-21T05:06:58.517000", "db": "NVD", "id": "CVE-2020-16226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-074" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of multiple Mitsubishi Electric products \u00a0TCP\u00a0 Session management flaw in protocol stack", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008251" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Command execution", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-074" } ], "trust": 0.6 } }
var-201911-1188
Vulnerability from variot
In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules. Provided by Mitsubishi Electric Corporation MELSEC-Q series CPU Unit and MELSEC-L series CPU Unit FTP The server function has a resource exhaustion vulnerability (CWE-400) Exists. Of the product FTP Server function interferes with service operation (DoS) It may be in a state. This vulnerability information is used by developers for the purpose of disseminating to product users. JPCERT/CC To report to JPCERT/CC Coordinated with the developer.Of the product FTP Server function interferes with service operation (DoS) By becoming a state, FTP The client FTP You will not be able to connect to the server. According to the developer, the vulnerability affects FTP It is only a server function. The Mitsubishi Electric MELSEC-Q Series is a MELSEC-Q series programmable logic controller from Mitsubishi Electric Corporation of Japan. The Mitsubishi MELSEC-L Series is a MELSEC-L series programmable logic controller from Mitsubishi Corporation of Japan
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1188", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "l26cpu-bt-cm", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "l02\\/06\\/26cpu-cm", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "l02\\/06\\/26cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "l26cpu-bt", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "l02\\/06\\/26cpu-p", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "q03udecpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21081" }, { "model": "l26cpu-pbt", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "q03\\/04\\/06\\/13\\/26udvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21081" }, { "model": "q04\\/06\\/13\\/26udpvcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21081" }, { "model": "q04\\/06\\/10\\/13\\/20\\/26\\/50\\/100udehcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "21081" }, { "model": "melsec-l series cpu unit", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "l02/06/26cpu" }, { "model": "melsec-l series cpu unit", "scope": "lte", "trust": 0.8, "vendor": "mitsubishi electric", "version": "l26cpu-bt ( top serial number 5 digits 21101 )" }, { "model": "melsec-l series cpu unit", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "l02/06/26cpu-cm" }, { "model": "melsec-l series cpu unit", "scope": "lte", "trust": 0.8, "vendor": "mitsubishi electric", "version": "l26cpu-bt-cm ( top serial number 5 digits 21101 )" }, { "model": "melsec-l series cpu unit", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "l02/06/26cpu-p" }, { "model": "melsec-l series cpu unit", "scope": "lte", "trust": 0.8, "vendor": "mitsubishi electric", "version": "l26cpu-pbt ( top serial number 5 digits 21101 )" }, { "model": "melsec-q series cpu unit", "scope": "lte", "trust": 0.8, "vendor": "mitsubishi electric", "version": "q03/04/06/13/26udvcpu ( top serial number 5 digits 21081 )" }, { "model": "melsec-q series cpu unit", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "q03udecpu" }, { "model": "melsec-q series cpu unit", "scope": "lte", "trust": 0.8, "vendor": "mitsubishi electric", "version": "q04/06/10/13/20/26/50/100udehcpu ( top serial number 5 digits 21081 )" }, { "model": "melsec-q series cpu unit", "scope": "lte", "trust": 0.8, "vendor": "mitsubishi electric", "version": "q04/06/13/26udpvcpu ( top serial number 5 digits 21081 )" }, { "model": "electric mitsubishi electric melsec-q series \u003c=q03/04/06/13/26udvcpu", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21081" }, { "model": "electric mitsubishi electric melsec-q series \u003c=q04/06/13/26udpvcpu", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21081" }, { "model": "electric mitsubishi electric melsec-q series \u003c=q03udecpu q04/06/10/13/20/26/50/100udehcpu", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21081" }, { "model": "electric mitsubishi melsec-l series \u003c=l26cpu-bt", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21101" }, { "model": "electric mitsubishi melsec-l series \u003c=l02/06/26cpu-p", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21101" }, { "model": "electric mitsubishi melsec-l series \u003c=l26cpu-pbt", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21101" }, { "model": "electric mitsubishi melsec-l series \u003c=l02/06/26cpu-cm", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21101" }, { "model": "electric mitsubishi melsec-l series \u003c=l26cpu-bt-cm", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21101" }, { "model": "electric mitsubishi melsec-l series \u003c=l02/06/26cpu", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "21101" }, { "model": "l26cpu-bt", "scope": "eq", "trust": 0.6, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "l26cpu-bt", "scope": "eq", "trust": 0.6, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-pbt", "scope": "eq", "trust": 0.6, "vendor": "mitsubishielectric", "version": "21101" }, { "model": "q03udecpu", "scope": "eq", "trust": 0.6, "vendor": "mitsubishielectric", "version": null }, { "model": "q03udecpu", "scope": "eq", "trust": 0.6, "vendor": "mitsubishielectric", "version": "21081" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "q03 04 06 13 26udvcpu", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "l26cpu bt cm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "q04 06 13 26udpvcpu", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "q03udecpu", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "q04 06 10 13 20 26 50 100udehcpu", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "l02 06 26cpu", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "l26cpu bt", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "l02 06 26cpu p", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "l26cpu pbt", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "l02 06 26cpu cm", "version": "*" } ], "sources": [ { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "CNVD", "id": "CNVD-2019-41428" }, { "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "db": "CNNVD", "id": "CNNVD-201911-424" }, { "db": "NVD", "id": "CVE-2019-13555" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:mitsubishielectric:melsec-l_series_cpu_unit", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mitsubishielectric:melsec-q_series_cpu_unit", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011686" } ] }, "cve": "CVE-2019-13555", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2019-13555", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-011686", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2019-41428", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2019-13555", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-011686", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-13555", "trust": 1.0, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2019-011686", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-41428", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-424", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-13555", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "CNVD", "id": "CNVD-2019-41428" }, { "db": "VULMON", "id": "CVE-2019-13555" }, { "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "db": "CNNVD", "id": "CNNVD-201911-424" }, { "db": "NVD", "id": "CVE-2019-13555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules. Provided by Mitsubishi Electric Corporation MELSEC-Q series CPU Unit and MELSEC-L series CPU Unit FTP The server function has a resource exhaustion vulnerability (CWE-400) Exists. Of the product FTP Server function interferes with service operation (DoS) It may be in a state. This vulnerability information is used by developers for the purpose of disseminating to product users. JPCERT/CC To report to JPCERT/CC Coordinated with the developer.Of the product FTP Server function interferes with service operation (DoS) By becoming a state, FTP The client FTP You will not be able to connect to the server. According to the developer, the vulnerability affects FTP It is only a server function. The Mitsubishi Electric MELSEC-Q Series is a MELSEC-Q series programmable logic controller from Mitsubishi Electric Corporation of Japan. The Mitsubishi MELSEC-L Series is a MELSEC-L series programmable logic controller from Mitsubishi Corporation of Japan", "sources": [ { "db": "NVD", "id": "CVE-2019-13555" }, { "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "db": "CNVD", "id": "CNVD-2019-41428" }, { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "VULMON", "id": "CVE-2019-13555" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-13555", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-19-311-01", "trust": 3.1 }, { "db": "CNVD", "id": "CNVD-2019-41428", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201911-424", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU97094124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-011686", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.4209", "trust": 0.6 }, { "db": "IVD", "id": "00D06E5F-E8D7-433D-9E94-3FF51C3E39B6", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2019-13555", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "CNVD", "id": "CNVD-2019-41428" }, { "db": "VULMON", "id": "CVE-2019-13555" }, { "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "db": "CNNVD", "id": "CNNVD-201911-424" }, { "db": "NVD", "id": "CVE-2019-13555" } ] }, "id": "VAR-201911-1188", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "CNVD", "id": "CNVD-2019-41428" } ], "trust": 1.7375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "CNVD", "id": "CNVD-2019-41428" } ] }, "last_update_date": "2024-11-23T23:04:35.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSEC-Q\u30b7\u30ea\u30fc\u30baCPU\u3001\u304a\u3088\u3073MELSEC-L\u30b7\u30ea\u30fc\u30baCPU\u306b\u304a\u3051\u308bFTP\u30b5\u30fc\u30d0\u6a5f\u80fd\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2019-002.pdf" }, { "title": "Patch for Mitsubishi Electric MELSEC-Q Series and Mitsubishi MELSEC-L Series Resource Management Error Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/191107" }, { "title": "Mitsubishi Electric MELSEC-Q Series and MELSEC-L Series Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=103038" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41428" }, { "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "db": "CNNVD", "id": "CNNVD-201911-424" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2019-13555" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-311-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13555" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13555" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu97094124" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4209/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/400.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41428" }, { "db": "VULMON", "id": "CVE-2019-13555" }, { "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "db": "CNNVD", "id": "CNNVD-201911-424" }, { "db": "NVD", "id": "CVE-2019-13555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "CNVD", "id": "CNVD-2019-41428" }, { "db": "VULMON", "id": "CVE-2019-13555" }, { "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "db": "CNNVD", "id": "CNNVD-201911-424" }, { "db": "NVD", "id": "CVE-2019-13555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-20T00:00:00", "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "date": "2019-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2019-41428" }, { "date": "2019-11-13T00:00:00", "db": "VULMON", "id": "CVE-2019-13555" }, { "date": "2019-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "date": "2019-11-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-424" }, { "date": "2019-11-13T23:15:11.327000", "db": "NVD", "id": "CVE-2019-13555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2019-41428" }, { "date": "2019-11-18T00:00:00", "db": "VULMON", "id": "CVE-2019-13555" }, { "date": "2019-12-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011686" }, { "date": "2019-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-424" }, { "date": "2024-11-21T04:25:08.387000", "db": "NVD", "id": "CVE-2019-13555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-424" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric MELSEC-Q series CPU Unit and MELSEC-L series CPU Unit FTP Server function resource exhaustion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011686" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Resource management error", "sources": [ { "db": "IVD", "id": "00d06e5f-e8d7-433d-9e94-3ff51c3e39b6" }, { "db": "CNNVD", "id": "CNNVD-201911-424" } ], "trust": 0.8 } }
var-202206-1251
Vulnerability from variot
Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions "16" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number "24051" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions "05" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.When the product receives a packet crafted by a remote third party, the product Ethernet Communication function interferes with service operation ( DoS ) May be in a state. In addition, service operation interruption ( DoS ) It is necessary to reset the product to recover from the state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-1251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "q13udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-\\ bt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q26udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q06udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q06phcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q10udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-bt-cm", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q26udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q06udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l06cpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q100udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q04udvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q20udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q06udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q50udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02scpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q04udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q26dhccpu-ls", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q13udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-bt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q13udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-pbt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q26udpvcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q03udecpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l26cpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l06cpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q06ccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02scpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "l02cpu-p", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "q04udehcpu", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec q \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melipc \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec l \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "NVD", "id": "CVE-2022-24946" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi Electric reported this vulnerability to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1550" } ], "trust": 0.6 }, "cve": "CVE-2022-24946", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-24946", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-24946", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001954", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-24946", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-24946", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202206-1550", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-24946", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-24946" }, { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "CNNVD", "id": "CNNVD-202206-1550" }, { "db": "NVD", "id": "CVE-2022-24946" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions \"16\" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. \"24061\" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number \"24051\" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number \"24051\" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions \"05\" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.When the product receives a packet crafted by a remote third party, the product Ethernet Communication function interferes with service operation ( DoS ) May be in a state. In addition, service operation interruption ( DoS ) It is necessary to reset the product to recover from the state", "sources": [ { "db": "NVD", "id": "CVE-2022-24946" }, { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "VULMON", "id": "CVE-2022-24946" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-24946", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU90895626", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-172-01", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2022-001954", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1550", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-24946", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-24946" }, { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "CNNVD", "id": "CNNVD-202206-1550" }, { "db": "NVD", "id": "CVE-2022-24946" } ] }, "id": "VAR-202206-1251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.75 }, "last_update_date": "2024-11-23T22:57:38.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSEC\u00a0 and \u00a0MELIPC\u00a0 Of the series \u00a0Ethernet\u00a0 Denial of service on port (DoS) Vulnerability", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-007.pdf" }, { "title": "Mitsubishi Electric MELSEC-Q Series Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=196987" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2022-24946 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-24946" }, { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "CNNVD", "id": "CNNVD-202206-1550" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-667", "trust": 1.0 }, { "problemtype": "Inappropriate resource lock (CWE-413) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "NVD", "id": "CVE-2022-24946" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01" }, { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu90895626/index.html" }, { "trust": 1.7, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24946" }, { "trust": 0.6, "url": "https://jvn.jp/vu/jvnvu#90895626/index.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-24946/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-172-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/667.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-24946" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-24946" }, { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "CNNVD", "id": "CNNVD-202206-1550" }, { "db": "NVD", "id": "CVE-2022-24946" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2022-24946" }, { "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "db": "CNNVD", "id": "CNNVD-202206-1550" }, { "db": "NVD", "id": "CVE-2022-24946" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-15T00:00:00", "db": "VULMON", "id": "CVE-2022-24946" }, { "date": "2022-06-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "date": "2022-06-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1550" }, { "date": "2022-06-15T21:15:09.333000", "db": "NVD", "id": "CVE-2022-24946" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-19T00:00:00", "db": "VULMON", "id": "CVE-2022-24946" }, { "date": "2024-05-31T03:20:00", "db": "JVNDB", "id": "JVNDB-2022-001954" }, { "date": "2022-08-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1550" }, { "date": "2024-11-21T06:51:26.130000", "db": "NVD", "id": "CVE-2022-24946" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1550" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric \u00a0MELSEC\u00a0 and \u00a0MELIPC\u00a0 Improper resource lock vulnerability in series", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001954" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1550" } ], "trust": 0.6 } }