Vulnerabilites related to mitsubishielectric - rj71en71
var-202211-1878
Vulnerability from variot
Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version "65" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version "65" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery. This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.If the product receives a specially crafted packet by a remote third party, the product will cause a denial of service. (DoS) may become a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1878", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "r32encpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "65" }, { "model": "r04encpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "65" }, { "model": "r120encpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "65" }, { "model": "r08encpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "65" }, { "model": "rj71en71", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "65" }, { "model": "r16encpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "65" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r04/08/16/32/120encpu ( network department ) firmware \"65\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71en71 firmware \"65\" and earlier" }, { "model": "melsec iq-r04", "scope": "lte", "trust": 0.6, "vendor": "mitsubishi electric", "version": "\u003c=65" }, { "model": "melsec iq-r08", "scope": "lte", "trust": 0.6, "vendor": "mitsubishi electric", "version": "\u003c=65" }, { "model": "melsec iq-r16", "scope": "lte", "trust": 0.6, "vendor": "mitsubishi electric", "version": "\u003c=65" }, { "model": "melsec iq-r32", "scope": "lte", "trust": 0.6, "vendor": "mitsubishi electric", "version": "\u003c=65" }, { "model": "melsec iq-r120encpu", "scope": "lte", "trust": 0.6, "vendor": "mitsubishi electric", "version": "\u003c=65" }, { "model": "melsec iq-rj71en71", "scope": "lte", "trust": 0.6, "vendor": "mitsubishi electric", "version": "\u003c=65" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-85487" }, { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "NVD", "id": "CVE-2022-40265" } ] }, "cve": "CVE-2022-40265", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-85487", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-40265", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-40265", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2022-002767", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-40265", "trust": 1.0, "value": "HIGH" }, { "author": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "id": "CVE-2022-40265", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2022-002767", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-85487", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-3700", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-85487" }, { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "CNNVD", "id": "CNNVD-202211-3700" }, { "db": "NVD", "id": "CVE-2022-40265" }, { "db": "NVD", "id": "CVE-2022-40265" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version \"65\" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version \"65\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery. This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.If the product receives a specially crafted packet by a remote third party, the product will cause a denial of service. (DoS) may become a state", "sources": [ { "db": "NVD", "id": "CVE-2022-40265" }, { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "CNVD", "id": "CNVD-2022-85487" }, { "db": "VULMON", "id": "CVE-2022-40265" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-40265", "trust": 3.9 }, { "db": "JVN", "id": "JVNVU94702422", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-22-335-01", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002767", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-85487", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.6281", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202211-3700", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-40265", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-85487" }, { "db": "VULMON", "id": "CVE-2022-40265" }, { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "CNNVD", "id": "CNNVD-202211-3700" }, { "db": "NVD", "id": "CVE-2022-40265" } ] }, "id": "VAR-202211-1878", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-85487" } ], "trust": 1.5166666666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-85487" } ] }, "last_update_date": "2024-08-14T15:42:05.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSEC\u00a0iQ-R\u00a0 series \u00a0Ethernet\u00a0 Denial of Service on Interface Units (DoS) Vulnerability", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-017.pdf" }, { "title": "Patch for Mitsubishi Electric Corporation MELSEC iQ-R Series Input Validation Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/365051" }, { "title": "Mitsubishi Electric MELSEC iQ-R series Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=216560" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-85487" }, { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "CNNVD", "id": "CNNVD-202211-3700" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "NVD", "id": "CVE-2022-40265" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://jvn.jp/vu/jvnvu94702422" }, { "trust": 1.7, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-017_en.pdf" }, { "trust": 0.9, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-335-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94702422/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-40265" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6281" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-40265/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-85487" }, { "db": "VULMON", "id": "CVE-2022-40265" }, { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "CNNVD", "id": "CNNVD-202211-3700" }, { "db": "NVD", "id": "CVE-2022-40265" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-85487" }, { "db": "VULMON", "id": "CVE-2022-40265" }, { "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "db": "CNNVD", "id": "CNNVD-202211-3700" }, { "db": "NVD", "id": "CVE-2022-40265" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-07T00:00:00", "db": "CNVD", "id": "CNVD-2022-85487" }, { "date": "2022-11-30T00:00:00", "db": "VULMON", "id": "CVE-2022-40265" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "date": "2022-11-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-3700" }, { "date": "2022-11-30T01:15:09.873000", "db": "NVD", "id": "CVE-2022-40265" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-07T00:00:00", "db": "CNVD", "id": "CNVD-2022-85487" }, { "date": "2022-11-30T00:00:00", "db": "VULMON", "id": "CVE-2022-40265" }, { "date": "2022-12-16T01:17:00", "db": "JVNDB", "id": "JVNDB-2022-002767" }, { "date": "2022-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-3700" }, { "date": "2022-12-06T19:36:10.460000", "db": "NVD", "id": "CVE-2022-40265" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-3700" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric \u00a0MELSEC\u00a0iQ-R\u00a0 series \u00a0Ethernet\u00a0 Improper Input Validation Vulnerability in Interface Unit", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002767" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-3700" } ], "trust": 0.6 } }
var-202011-1261
Vulnerability from variot
Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet. Provided by Mitsubishi Electric Corporation MELSEC iQ-R Resource exhaustion vulnerabilities in series units (CWE-400) Exists This vulnerability information is provided by the developer for the purpose of making it known to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.Crafted by a remote third party SLMP Receiving packets can have the following effects: * CPU In the case of a unit, an error occurs and program execution and communication interfere with service operation. (DoS) Become in a state * CPU In the case of other than the unit, communication via the unit interferes with service operation. (DoS) In addition, a reset is required for recovery
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "r32cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "rj71en71", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "r16pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r01cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "19" }, { "model": "rj71gp21s-sx", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "rj71c24-r4", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "r00cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "19" }, { "model": "r08cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r32sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "rj71c24-r2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "r04cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r08psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "r16psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "r120pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r32pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r120cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r02cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "19" }, { "model": "r32psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "rj71gf11-t2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "rj72gf15-t2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "07" }, { "model": "r08sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "r16sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "r16cpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "51" }, { "model": "r120sfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22" }, { "model": "rj71gn11-t2", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "11" }, { "model": "r08pcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "25" }, { "model": "r120psfcpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "06" }, { "model": "rj71gp21-sx", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "47" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gp21s-sx firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gp21-sx firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gn11-t2 firmware \"11\" and later" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj72gf15-t2 firmware \"07\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r00/01/02cpu firmware \"19\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71en71 firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r08/16/32/120psfcpu firmware \"06\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71c24 (-r2/r4) all s" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r08/16/32/120sfcpu firmware \"22\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series rj71gf11-t2 firmware \"47\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r08/16/32/120pcpu firmware \"25\" and earlier" }, { "model": "melsec iq-r \u30b7\u30ea\u30fc\u30ba", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "melsec iq-r series r04/08/16/32/120 (en) cpu firmware \"51\" and earlier" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "51", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "06", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "07", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "47", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5668" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Xiaofei.Zhang reported this vulnerability to Mitsubishi Electric.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1663" } ], "trust": 0.6 }, "cve": "CVE-2020-5668", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-5668", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-5668", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-009595", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-5668", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2020-009595", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202011-1663", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet. Provided by Mitsubishi Electric Corporation MELSEC iQ-R Resource exhaustion vulnerabilities in series units (CWE-400) Exists This vulnerability information is provided by the developer for the purpose of making it known to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.Crafted by a remote third party SLMP Receiving packets can have the following effects: * CPU In the case of a unit, an error occurs and program execution and communication interfere with service operation. (DoS) Become in a state * CPU In the case of other than the unit, communication via the unit interferes with service operation. (DoS) In addition, a reset is required for recovery", "sources": [ { "db": "NVD", "id": "CVE-2020-5668" }, { "db": "JVNDB", "id": "JVNDB-2020-009595" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVNVU95980140", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-20-324-05", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2020-5668", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-009595", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.4117", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202011-1663", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "id": "VAR-202011-1261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2022-05-04T09:59:40.179000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSEC\u00a0iQ-R Of the series Ethernet Denial of service on port \u00a0(DoS)\u00a0 Vulnerability", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "title": "Mitsubishi Electric MELSEC iQ-R series Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=137118" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.0 }, { "problemtype": "Resource exhaustion (CWE-400) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "trust": 1.6, "url": "https://jvn.jp/vu/jvnvu95980140/index.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95980140" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4117/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5668" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "db": "NVD", "id": "CVE-2020-5668" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "date": "2020-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "date": "2020-11-20T04:15:00", "db": "NVD", "id": "CVE-2020-5668" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-15T06:01:00", "db": "JVNDB", "id": "JVNDB-2020-009595" }, { "date": "2021-12-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1663" }, { "date": "2022-04-29T13:21:00", "db": "NVD", "id": "CVE-2020-5668" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1663" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric \u00a0MELSEC\u00a0iQ-R\u00a0 Resource exhaustion vulnerabilities in the series", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-009595" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1663" } ], "trust": 0.6 } }
var-202010-0395
Vulnerability from variot
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. of multiple Mitsubishi Electric products TCP A vulnerability in session management exists in the protocol stack. This vulnerability information is provided by the developer for the purpose of dissemination to product users. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Mitsubishi Electric gt14 model是日本三菱电机(Mitsubishi Electric)公司的一个用于工业生产过程中提供人机交互界面的设备. Mitsubishi Electric 多个产品存在命令执行漏洞,该漏洞允许攻击者冒充合法设备,从而使攻击者能够远程执行任意命令。以下产品和版本受到影响:QJ71MES96 all versions,QJ71WS96 all versions,Q06CCPU-V all versions,Q24DHCCPU-V all versions,Q24DHCCPU-VG all versions,R12CCPU-V Version 13 and prior,RD55UP06-V Version 09 and prior,RD55UP12-V Version 01,RJ71GN11-T2 Version 11 and prior,RJ71EN71 all versions,QJ71E71-100 all versions,LJ71E71-100 all versions,QJ71MT91 all versions,RD78Gn(n=4,8,16,32,64) all versions,RD78GHV all versions,RD78GHW all versions,NZ2GACP620-60 all versions,NZ2GACP620-300 all versions,NZ2FT-MT all versions,NZ2FT-EIP all versions,Q03UDECPU the first 5 digits of serial number 22081 and prior,QnUDEHCPU(n=04/06/10/13/20/26/50/100) the first 5 digits of serial number 22081 and prior,QnUDVCPU(n=03/04/06/13/26) the first 5 digits of serial number 22031 and prior,QnUDPVCPU(n=04/06/13/26) the first 5 digits of serial number 22031 and prior,LnCPU(-P)(n=02/06/26) the first 5 digits of serial number 22051 and prior,L26CPU-(P)BT the first 5 digits of serial number 22051 and prior,RnCPU(n=00/01/02) Version 18 and prior,RnCPU(n=04/08/16/32/120) Version 50 and prior,RnENCPU(n=04/08/16/32/120) Version 50 and prior,RnSFCPU (n=08/16/32/120) Version 22 and prior,RnPCPU(n=08/16/32/120) Version 24 and prior,RnPSFCPU(n=08/16/32/120) Version 05 and prior,FX5U(C)-M*/,FX5UC-32M/-TS Version 1.210 and prior,FX5UJ-M/ Version 1.000,FX5-ENET Version 1.002 and prior,FX5-ENET/IP Version 1.002 and prior,FX3U-ENET-ADP Version 1.22 and prior,FX3GE-M/* the first 3 digits of serial number 20X and prior,FX3U-ENET Version 1.14 and prior,FX3U-ENET-L Version 1.14 and prior,FX3U-ENET-P502 Version 1.14 and prior,FX5-CCLGN-MS Version 1.000,IU1-1M20-D all versions,LE7-40GU-L all versions,GOT2000 Series GT21 Model all versions,GS Series all versions,GOT1000 Series GT14 Model all versions,GT25-J71GN13-T2 all versions,FR-A800-E Series production date December 2020 and prior,FR-F800-E Series production date December 2020 and prior,FR-A8NCG Production date August 2020 and prior,FR-E800-EPA Series Production date July 2020 and prior,FR-E800-EPB Series Production date July 2020 and prior,Conveyor Tracking Application APR-nTR3FH APR-nTR6FH APR-nTR12FH APR-nTR20FH(n=1,2) all versions (Discontinued product),MR-JE-C all versions,MR-J4-TM all versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-0395", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fr-f842-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnpsfcpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qj71ws96", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-14mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f860-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "q24dhccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-24mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx3u-enet", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "q24dhccpu-vg", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnpcpu\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "got2000 series gt21", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-60mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5-enet-adp", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a860-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rd55up06-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uc-32mr\\/ds-ts", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "got1000 series gt14", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr12fh", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "rd78ghv", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f820-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f840-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qnudehcpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22081" }, { "model": "qnudpvcpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22031" }, { "model": "fx5uj-24mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "nz2gacp620-60", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnsfcpu \\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rj71en71", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5-enet", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a862-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qj71e71-100", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "mr-j4-tm", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "r12ccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "mr-je-c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-40mt\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx3g-32 mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "qnudvcpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22031" }, { "model": "lj71e71-100", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-40mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx5uc-32mt\\/d", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "fx5uj-60mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx3g-14mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-14mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5-cclgn-ms", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a8ncge", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "2020-08" }, { "model": "qj71mt91", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a820-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-60mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fr-e800-epa", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "2020-07" }, { "model": "got simple series gs21", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-e800-epb", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "2020-07" }, { "model": "fx3g-14mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rj71gn11-t2", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-40mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "le7-40gu-l", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-40mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "iu1-1m20-d", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "nz2gacp620-300", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "l26cpu-\\ bt", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22051" }, { "model": "nz2ft-mt", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "q06ccpu-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-f862-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr6fh", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3g-24mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rd78gn\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-24mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "lncpu\\ \\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22051" }, { "model": "fx3g-60mr\\/ds", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr3fh", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-24mr\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "conveyor tracking application apr-ntr20fh\\", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": null }, { "model": "fx3u-enet-l", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a842-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fr-a840-e", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-60mt\\/ess", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rd78ghw", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uc-32mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "rncpu\\ t", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "18" }, { "model": "fx3u-enet-p502", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "gt25-j71gn13-t2", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uc-32mt\\/ds-ts", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "q03udecpu", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "22081" }, { "model": "fx5uj-60mt\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "fx5uc-32mt\\/dss-ts", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.210" }, { "model": "fx5-enet\\/ip", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx3g-60mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rncpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "50" }, { "model": "fx3g-24mt\\/dss", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "rnencpu\\", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "50" }, { "model": "qj71mes96", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "fx5uj-24mt\\/es", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "1.000" }, { "model": "rd55up12-v", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "nz2ft-eip", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "(multiple products)" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * ac the servo melservo" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * lossnay central ventilation system" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * display got" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * air conditioning control system / centralized controller" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * air conditioning control system / expansion controller" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * energy measurement unit" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "affected products s vary widely. for more information, please check the information provided by the developer." }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * range hood fan" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * data collection analyzer melqic" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * hems compatible adapter, lan adapter" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * air conditioning control system / bm adapter" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * room air conditioner" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * bath drying/heating/ventilation system" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * solar power system color monitor eco guide" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * ventilation fan for duct" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * tension controller" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * inverter freqrol" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * mitsubishi energy saving dem monitoring server e-energy" }, { "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "it was * robot melfa" }, { "model": "melsec iq-f", "scope": null, "trust": 0.7, "vendor": "mitsubishi electric", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ta-Lun Yen of TXOne IoT/ICS Security Research Labs (Trend Micro)", "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" } ], "trust": 0.7 }, "cve": "CVE-2020-16226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-16226", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-16226", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2020-16226", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-16226", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-16226", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2020-16226", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-16226", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202009-074", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2020-16226", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. of multiple Mitsubishi Electric products TCP A vulnerability in session management exists in the protocol stack. This vulnerability information is provided by the developer for the purpose of dissemination to product users. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Mitsubishi Electric gt14 model\u662f\u65e5\u672c\u4e09\u83f1\u7535\u673a\uff08Mitsubishi Electric\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u7528\u4e8e\u5de5\u4e1a\u751f\u4ea7\u8fc7\u7a0b\u4e2d\u63d0\u4f9b\u4eba\u673a\u4ea4\u4e92\u754c\u9762\u7684\u8bbe\u5907. \nMitsubishi Electric \u591a\u4e2a\u4ea7\u54c1\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u653b\u51fb\u8005\u5192\u5145\u5408\u6cd5\u8bbe\u5907\uff0c\u4ece\u800c\u4f7f\u653b\u51fb\u8005\u80fd\u591f\u8fdc\u7a0b\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u4ee5\u4e0b\u4ea7\u54c1\u548c\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aQJ71MES96 all versions\uff0cQJ71WS96 all versions\uff0cQ06CCPU-V all versions\uff0cQ24DHCCPU-V all versions\uff0cQ24DHCCPU-VG all versions\uff0cR12CCPU-V Version 13 and prior\uff0cRD55UP06-V Version 09 and prior\uff0cRD55UP12-V Version 01\uff0cRJ71GN11-T2 Version 11 and prior\uff0cRJ71EN71 all versions\uff0cQJ71E71-100 all versions\uff0cLJ71E71-100 all versions\uff0cQJ71MT91 all versions\uff0cRD78Gn(n=4,8,16,32,64) all versions\uff0cRD78GHV all versions\uff0cRD78GHW all versions\uff0cNZ2GACP620-60 all versions\uff0cNZ2GACP620-300 all versions\uff0cNZ2FT-MT all versions\uff0cNZ2FT-EIP all versions\uff0cQ03UDECPU the first 5 digits of serial number 22081 and prior\uff0cQnUDEHCPU(n=04/06/10/13/20/26/50/100) the first 5 digits of serial number 22081 and prior\uff0cQnUDVCPU(n=03/04/06/13/26) the first 5 digits of serial number 22031 and prior\uff0cQnUDPVCPU(n=04/06/13/26) the first 5 digits of serial number 22031 and prior\uff0cLnCPU(-P)(n=02/06/26) the first 5 digits of serial number 22051 and prior\uff0cL26CPU-(P)BT the first 5 digits of serial number 22051 and prior\uff0cRnCPU(n=00/01/02) Version 18 and prior\uff0cRnCPU(n=04/08/16/32/120) Version 50 and prior\uff0cRnENCPU(n=04/08/16/32/120) Version 50 and prior\uff0cRnSFCPU (n=08/16/32/120) Version 22 and prior\uff0cRnPCPU(n=08/16/32/120) Version 24 and prior\uff0cRnPSFCPU(n=08/16/32/120) Version 05 and prior\uff0cFX5U(C)-**M*/**\uff0cFX5UC-32M*/**-TS Version 1.210 and prior\uff0cFX5UJ-**M*/** Version 1.000\uff0cFX5-ENET Version 1.002 and prior\uff0cFX5-ENET/IP Version 1.002 and prior\uff0cFX3U-ENET-ADP Version 1.22 and prior\uff0cFX3GE-**M*/** the first 3 digits of serial number 20X and prior\uff0cFX3U-ENET Version 1.14 and prior\uff0cFX3U-ENET-L Version 1.14 and prior\uff0cFX3U-ENET-P502 Version 1.14 and prior\uff0cFX5-CCLGN-MS Version 1.000\uff0cIU1-1M20-D all versions\uff0cLE7-40GU-L all versions\uff0cGOT2000 Series GT21 Model all versions\uff0cGS Series all versions\uff0cGOT1000 Series GT14 Model all versions\uff0cGT25-J71GN13-T2 all versions\uff0cFR-A800-E Series production date December 2020 and prior\uff0cFR-F800-E Series production date December 2020 and prior\uff0cFR-A8NCG Production date August 2020 and prior\uff0cFR-E800-EPA Series Production date July 2020 and prior\uff0cFR-E800-EPB Series Production date July 2020 and prior\uff0cConveyor Tracking Application APR-nTR3FH APR-nTR6FH APR-nTR12FH APR-nTR20FH(n=1,2) all versions (Discontinued product)\uff0cMR-JE-C all versions\uff0cMR-J4-TM all versions", "sources": [ { "db": "NVD", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "VULMON", "id": "CVE-2020-16226" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-16226", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-245-01", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU93926439", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-008251", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10966", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-1207", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3041", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.4767", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-074", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-16226", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "id": "VAR-202010-0395", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.41666666 }, "last_update_date": "2024-11-23T21:51:16.463000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "of our products TCP Spoofing Vulnerability in Protocol Stack", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-009.pdf" }, { "title": "Mitsubishi Electric has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" }, { "title": "mitsubishielectric Fixes for remote command execution vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=127702" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-342", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93926439/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3041/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16226" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.4767" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/342.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-245-01" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-1207" }, { "db": "VULMON", "id": "CVE-2020-16226" }, { "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "db": "CNNVD", "id": "CNNVD-202009-074" }, { "db": "NVD", "id": "CVE-2020-16226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-08T00:00:00", "db": "ZDI", "id": "ZDI-20-1207" }, { "date": "2020-10-05T00:00:00", "db": "VULMON", "id": "CVE-2020-16226" }, { "date": "2020-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "date": "2020-09-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-074" }, { "date": "2020-10-05T18:15:13.133000", "db": "NVD", "id": "CVE-2020-16226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-17T00:00:00", "db": "ZDI", "id": "ZDI-20-1207" }, { "date": "2020-10-22T00:00:00", "db": "VULMON", "id": "CVE-2020-16226" }, { "date": "2022-09-26T08:55:00", "db": "JVNDB", "id": "JVNDB-2020-008251" }, { "date": "2022-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-074" }, { "date": "2024-11-21T05:06:58.517000", "db": "NVD", "id": "CVE-2020-16226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-074" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of multiple Mitsubishi Electric products \u00a0TCP\u00a0 Session management flaw in protocol stack", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008251" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Command execution", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-074" } ], "trust": 0.6 } }
cve-2020-5668
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | x_refsource_MISC | |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU95980140/index.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Mitsubishi Electric Corporation | MELSEC iQ-R |
Version: R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:39:25.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MELSEC iQ-R", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-17T11:15:29", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5668", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MELSEC iQ-R", "version": { "version_data": [ { "version_value": "R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier" } ] } } ] }, "vendor_name": "Mitsubishi Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "name": "https://jvn.jp/vu/JVNVU95980140/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95980140/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5668", "datePublished": "2020-11-20T03:30:23", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:39:25.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40265
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric Corporation | MELSEC iQ-R Series RJ71EN71 |
Version: Firmware version "65" and prior |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-017_en.pdf" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU94702422" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MELSEC iQ-R Series RJ71EN71", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Firmware version \"65\" and prior" } ] }, { "product": "MELSEC iQ-R Series R04/08/16/32/120ENCPU", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Network Part Firmware version \"65\" and prior" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version \"65\" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version \"65\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery." } ], "value": "Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version \"65\" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version \"65\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Denial of Service" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-30T00:04:43.069Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-017_en.pdf" }, { "url": "https://jvn.jp/vu/JVNVU94702422" } ], "source": { "discovery": "UNKNOWN" }, "title": "Denial of Service (DoS) Vulnerability in MELSEC iQ-R Series Ethernet Interface Module", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-40265", "datePublished": "2022-11-30T00:04:43.069Z", "dateReserved": "2022-09-08T19:40:16.931Z", "dateUpdated": "2024-08-03T12:14:40.016Z", "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-16226
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 | x_refsource_MISC |
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric | QJ71MES96 |
Version: all versions |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:54.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "QJ71MES96", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71WS96", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q06CCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q24DHCCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q24DHCCPU-VG", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "R12CCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD55UP06-V,", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "D55UP12-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RJ71GN11-T2", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RJ71EN71", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71E71-100", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LJ71E71-100", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71MT91", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78Gn(n=4,8,16,32,64)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78GHV", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78GHW", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2GACP620-60", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2GACP620-300", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2FT-MT", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2FT-EIP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q03UDECPU", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22081 and prior" } ] }, { "product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22081 and prior" } ] }, { "product": "QnUDVCPU(n=03/04/06/13/26)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22031 and prior" } ] }, { "product": "QnUDPVCPU(n=04/06/13/2)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22031 and prior" } ] }, { "product": "LnCPU(-P)(n=02/06/26)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22051 and prior" } ] }, { "product": "L26CPU-(P)BT", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22051 and prior" } ] }, { "product": "RnCPU(n=00/01/02)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 18 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnCPU(n=04/08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 50 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnENCPU(n=04/08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 50 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnSFCPU (n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RnPCPU(n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RnPSFCPU(n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5U(C)-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Serial number 17X**** or later: Version 1.210 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "Serial number 179**** and prior: Version 1.070 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FX5UC-32M*/**-TS", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 1.210 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FX5UJ-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 1.000" } ] }, { "product": "FX5-ENET", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5-ENET/IP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-ADP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3GE-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-L", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-P502", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5-CCLGN-MS", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "IU1-1M20-D", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LE7-40GU-L", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GOT2000 Series GT21 Model", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GS Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GOT1000 Series GT14 Model", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GT25-J71GN13-T2", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-A800-E Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-F800-E Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-A8NCG", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date August 2020 and prior" } ] }, { "product": "FR-E800-EPA Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date July 2020 and prior" } ] }, { "product": "FR-E800-EPB Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date July 2020 and prior" } ] }, { "product": "Conveyor Tracking Application", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "APR-nTR3FH all versions" }, { "status": "affected", "version": "APR-nTR6FH all versions" }, { "status": "affected", "version": "APR-nTR12FH all versions" }, { "status": "affected", "version": "APR-nTR20FH(n=1,2) all versions" } ] }, { "product": "MR-JE-C", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "MR-J4-TM", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "datePublic": "2020-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-05T17:19:17", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "source": { "advisory": "ICSA-20-245-01", "discovery": "UNKNOWN" }, "title": "Mitsubishi Electric Multiple Products", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2020-09-01T16:00:00.000Z", "ID": "CVE-2020-16226", "STATE": "PUBLIC", "TITLE": "Mitsubishi Electric Multiple Products" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QJ71MES96", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71WS96", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q06CCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q24DHCCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q24DHCCPU-VG", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "R12CCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD55UP06-V,", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "D55UP12-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RJ71GN11-T2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RJ71EN71", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71E71-100", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "LJ71E71-100", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71MT91", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78Gn(n=4,8,16,32,64)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78GHV", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78GHW", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2GACP620-60", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2GACP620-300", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2FT-MT", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2FT-EIP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q03UDECPU", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22081 and prior" } ] } }, { "product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22081 and prior" } ] } }, { "product_name": "QnUDVCPU(n=03/04/06/13/26)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22031 and prior" } ] } }, { "product_name": "QnUDPVCPU(n=04/06/13/2)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22031 and prior" } ] } }, { "product_name": "LnCPU(-P)(n=02/06/26)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22051 and prior" } ] } }, { "product_name": "L26CPU-(P)BT", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22051 and prior" } ] } }, { "product_name": "RnCPU(n=00/01/02)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 18 and prior" } ] } }, { "product_name": "RnCPU(n=04/08/16/32/120)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 50 and prior" } ] } }, { "product_name": "RnENCPU(n=04/08/16/32/120)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 50 and prior" } ] } }, { "product_name": "RnSFCPU (n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RnPCPU(n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RnPSFCPU(n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5U(C)-**M*/**", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Serial number 17X**** or later: Version 1.210 and prior" }, { "version_affected": "\u003c", "version_value": "Serial number 179**** and prior: Version 1.070 and prior" } ] } }, { "product_name": "FX5UC-32M*/**-TS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 1.210 and prior" } ] } }, { "product_name": "FX5UJ-**M*/**", "version": { "version_data": [ { "version_affected": "=", "version_value": "Version 1.000" } ] } }, { "product_name": "FX5-ENET", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5-ENET/IP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-ADP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3GE-**M*/**", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-L", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-P502", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5-CCLGN-MS", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "IU1-1M20-D", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "LE7-40GU-L", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GOT2000 Series GT21 Model", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GS Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GOT1000 Series GT14 Model", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GT25-J71GN13-T2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-A800-E Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-F800-E Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-A8NCG", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date August 2020 and prior" } ] } }, { "product_name": "FR-E800-EPA Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date July 2020 and prior" } ] } }, { "product_name": "FR-E800-EPB Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date July 2020 and prior" } ] } }, { "product_name": "Conveyor Tracking Application", "version": { "version_data": [ { "version_affected": "=", "version_name": "APR-nTR3FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR6FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR12FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR20FH(n=1,2)", "version_value": "all versions" } ] } }, { "product_name": "MR-JE-C", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "MR-J4-TM", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } } ] }, "vendor_name": "Mitsubishi Electric" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ] }, "source": { "advisory": "ICSA-20-245-01", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-16226", "datePublished": "2020-10-05T17:19:17.358565Z", "dateReserved": "2020-07-31T00:00:00", "dateUpdated": "2024-09-17T00:25:38.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/vu/JVNVU95980140/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | Third Party Advisory, US Government Resource | |
vultures@jpcert.or.jp | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | Vendor Advisory | |
vultures@jpcert.or.jp | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU95980140/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r00cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6314D599-F0B6-4D42-A6F5-985F09BD1694", "versionEndIncluding": "19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r00cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A23F21-9C5F-4CB3-BA20-4195B2165D26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r01cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAB241EF-238E-44BF-8995-4DC2EC4DBF69", "versionEndIncluding": "19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r01cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CADF6528-4B25-4779-A06F-2C4DF91DAE90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r02cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD971E61-145F-425C-A5E0-788CA22A9464", "versionEndIncluding": "19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r02cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D753C47-ED9C-453F-AC1F-C50476BE61C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17518878-FF10-498F-A506-93D76D5F6371", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDEEF15E-FE32-4610-9E14-891069573E4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFAE4231-9FC7-4744-8652-1AC0202C5298", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DAA2202-88D5-4329-BF51-0F18C350C45C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4C99DED-CA7F-496A-ADDF-3B2C8D5D6792", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "30016EA0-FB24-4382-8960-6A75D32C9BD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1D0609F-30CB-424B-890E-F9BDF8A6606F", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6EB84-7D97-4606-A90F-9D443CBC4755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120cpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC00F22C-BFEF-41E9-9B49-9FDE2B0D5804", "versionEndIncluding": "51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120cpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF7D08E-D3D1-48D4-9440-B94B7A2BD662", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E49CF5A5-8F0E-4E41-9B6F-15641CD32E29", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "B185323A-C9E3-48A0-AD28-DA7AC7846E18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "844B3E94-7F24-4523-AE29-55D5C55D4A99", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4BBE066-33C4-4410-85D3-4B77B3773330", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15096442-7E6B-4846-9A8F-01023A54DFA0", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F6304BE-DAEE-49AB-B0B1-CEE6878CBECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DE2946C-E8C0-4253-B84C-16A81767343E", "versionEndIncluding": "22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "515BDC46-5A1C-4A94-816A-B4751BB1B58D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F94C8F7E-8626-434C-A699-99751BE9D60E", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3845683A-A4D2-422F-9736-D0D7A430555F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D993D0D-FA5B-4819-86C2-F182464CFFAF", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA04F2DD-4D51-4D4F-B3C7-D5EFACAD6EFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7354680-CF1D-4CA6-BC3F-39DA0B621612", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EA2A77C-86CE-48E1-87A4-A69895102D49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120pcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "974AB564-75E3-4ADF-9F25-7DFDCFF4D03A", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120pcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0FE9EA6-6BCE-40F7-8AE8-173F7CDF3EF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42566660-1AD6-466C-B07C-D263F701774B", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA37F2FC-8F75-4FEA-882D-87AD5CC1558E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "732D97FD-3D80-43A6-B41A-3B3BFC09E152", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "17AD5875-B7D7-498B-9484-23049753133E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B92974DE-CD79-470B-9308-6D4FEF1C689B", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EC2594C-6067-40BA-B8B2-AEC9B9C7922F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9DA8768-E0AD-4603-9C3C-AE7E02BEFBC9", "versionEndIncluding": "06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA3FB3E1-D7D3-424B-A207-D3C6F4365D12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9EDD7F7-18C8-424E-9808-409080AAC764", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gf11-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EDC22E7-38B1-42DF-9F48-BAB477156B54", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gf11-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA16A0DE-CBBD-4871-85C8-1F3AD7D2A074", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj72gf15-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A35CD177-3A86-4E6A-99CE-089CCDD38A14", "versionEndIncluding": "07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj72gf15-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC7B087E-9F37-4D35-90E3-3BAB91D4A69C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gp21-sx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "918EA7ED-100C-4A4B-B848-C41E0B821FE3", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gp21-sx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F31A6CCB-56E8-4C79-8121-B0DFAB4C32E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gp21s-sx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E54F3518-DB4E-4DE1-B97D-37860CF88BAC", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gp21s-sx:-:*:*:*:*:*:*:*", "matchCriteriaId": "95224DAD-C888-451D-9A2B-F7583A5837B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71c24-r2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBD7FC5-859D-419E-BAAE-B4E58FDA0887", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71c24-r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E93B863-EDC2-4584-B998-A0CF23824037", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71c24-r4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61EA2C4A-216B-42EB-BA67-70C060C25DAC", "versionEndIncluding": "47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71c24-r4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EB02306-42B5-46EA-AD6A-79041E36FA2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "608DB833-3477-4596-80A5-99AE0A3A4993", "versionEndIncluding": "11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5FE39-4540-4A95-ABA8-15F8EA545DE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version \u002719\u0027 and earlier, R04/08/16/32/120 (EN) CPU firmware version \u002751\u0027 and earlier, R08/16/32/120SFCPU firmware version \u002722\u0027 and earlier, R08/16/32/120PCPU firmware version \u002725\u0027 and earlier, R08/16/32/120PSFCPU firmware version \u002706\u0027 and earlier, RJ71EN71 firmware version \u002747\u0027 and earlier, RJ71GF11-T2 firmware version \u002747\u0027 and earlier, RJ72GF15-T2 firmware version \u002707\u0027 and earlier, RJ71GP21-SX firmware version \u002747\u0027 and earlier, RJ71GP21S-SX firmware version \u002747\u0027 and earlier, and RJ71GN11-T2 firmware version \u002711\u0027 and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet" }, { "lang": "es", "value": "Vulnerabilidad de consumo incontrolado de recursos en los m\u00f3dulos de la serie iQ-R de MELSEC (R00/01/02CPU firmware versi\u00f3n \u002719\u0027 y anteriores, R04/08/16/32/120 (ES) CPU firmware versi\u00f3n \u002751\u0027 y anteriores, R08/16/32/120SFCPU firmware versi\u00f3n \u002722\u0027 y anteriores, R08/16/32/120PCPU firmware versi\u00f3n \u002725\u0027 y anterior, R08/16/32/120PSFCPU firmware versi\u00f3n \u002706\u0027 y anterior, RJ71EN71 firmware versi\u00f3n \u002747\u0027 y anterior, RJ71GF11-T2 firmware versi\u00f3n \u002747\u0027 y anterior, RJ72GF15-T2 firmware versi\u00f3n \u002707\u0027 y anterior, RJ71GP21-SX firmware versi\u00f3n \u002747\u0027 y anterior, RJ71GP21S-SX firmware versi\u00f3n \u002747\u0027 y anterior, y RJ71GN11-T2 firmware versi\u00f3n \u002711\u0027 y anteriores) permite a un atacante remoto no autentificado provocar un error en una CPU y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en la ejecuci\u00f3n del programa y su comunicaci\u00f3n, o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en la comunicaci\u00f3n a trav\u00e9s de la unidad mediante la recepci\u00f3n de un paquete SLMP especialmente dise\u00f1ado" } ], "id": "CVE-2020-5668", "lastModified": "2024-11-21T05:34:27.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-20T04:15:11.423", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU95980140/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71mes96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C7DBDF-F467-4310-8B65-EF611692202F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71mes96:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E9566C3-CFB4-4658-AFAE-ADD1B9DA9211", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71ws96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4AB29EE-605F-4140-A84F-B82E7762D826", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71ws96:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39BAAFF-FF1F-4279-B501-E0A918CC54CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q06ccpu-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED3CA2D-EE3F-4281-883F-4A7FCB4CEE3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q06ccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "E517BA2F-CF39-49C2-A68E-64A2CE17DBDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E848004-A141-4C9F-9A6C-73A3BD7A6082", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "210A2E8A-BF20-43F5-BA07-CB662833DE1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-vg_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D1FC6B1-F265-4565-95A7-1F3F55634C17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-vg:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DF6F77-EEB5-4CB3-B041-7BA43F16E2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56BCED50-FEC2-4F26-81AC-0C3C9BD12C4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r12ccpu-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B938943-DDD5-43DC-98A3-29D0E6AFBF85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd55up06-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF1853A1-8C0D-4EC0-BECC-A89D1CEFDFE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd55up06-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1F5EF13-A273-459E-815B-F21C57D44204", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd55up12-v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E5CCD36-42A4-4B7C-B5E1-23F6E4BB1DAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd55up12-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED862A7-87F7-4548-B2AB-2A3DB3ED1482", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3F3EDD1-A50F-4581-96D7-9577F9836574", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5FE39-4540-4A95-ABA8-15F8EA545DE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B038D8DD-BE83-4AEB-96DF-FAF9EA630222", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BAF2D41-713E-4EA6-A705-57963DBF1309", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD1EB30-B1FC-49CC-97D7-739AA5E92E86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:lj71e71-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFBF46E0-7580-48ED-AB04-490204FBBA33", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:lj71e71-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF312DE0-1882-41A2-A2F6-BA4CB71837E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qj71mt91_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BC6EE26-1644-45F7-8489-B6380FC493F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qj71mt91:-:*:*:*:*:*:*:*", "matchCriteriaId": "58095D28-F44C-4876-9B6F-6D1CFD3D602A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd78gn\\(n\\=4\\,8\\,16\\,32\\,64\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8B55521-A137-4A7F-839E-1B3DBCB7E313", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd78gn\\(n\\=4\\,8\\,16\\,32\\,64\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "FE041A8C-11A7-4FAB-A363-49F429AEF24A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd78ghv_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5DCA431-9DA7-48B5-9107-86CA9DAD360E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd78ghv:-:*:*:*:*:*:*:*", "matchCriteriaId": "12E5533D-15A8-471B-899B-FE9F9655EE8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rd78ghw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B9722D1-BAB9-4E43-8612-4B6496DD1AF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rd78ghw:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B5C3119-7579-4623-8513-65A281BDF0D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2gacp620-60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5A3B553-08E8-4415-BDAF-897181D5B11A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2gacp620-60:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFB0F4E4-F634-4D0C-A693-AC48962C320B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2gacp620-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E791C3F4-D449-4B3B-B07D-A683D621B6A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2gacp620-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABDD7EA6-1946-46DB-AD2B-2F778AB11AA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2ft-mt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "071EB002-B837-48B0-8276-A8B0AA5D578E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2ft-mt:-:*:*:*:*:*:*:*", "matchCriteriaId": "713AE73B-463A-4B2B-8B35-64FB0D53B416", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:nz2ft-eip_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40F04BC6-17EA-4F6F-BB5B-C87FEE3CB59B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:nz2ft-eip:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5CF34B6-9CCF-491C-A327-A38D0BAC504D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37E5D21A-8561-45FE-88E1-725D3488AA22", "versionEndIncluding": "22081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "946DA26E-A6B2-46F6-BA81-A92133124823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qnudehcpu\\(n\\=04\\/06\\/10\\/13\\/20\\/26\\/50\\/100\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503A8334-5C68-440E-B76D-5B834557C999", "versionEndIncluding": "22081", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qnudehcpu\\(n\\=04\\/06\\/10\\/13\\/20\\/26\\/50\\/100\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "94A82925-8D77-4914-924A-350CF77857A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qnudvcpu\\(n\\=03\\/04\\/06\\/13\\/26\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57284400-F051-4E3A-B019-B308EF4F4997", "versionEndIncluding": "22031", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qnudvcpu\\(n\\=03\\/04\\/06\\/13\\/26\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "745BC528-D8A3-4393-A267-0A4E2FB81603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:qnudpvcpu\\(n\\=04\\/06\\/13\\/2\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9EE5B71-EEAB-47E4-BCAB-1E81C40686B5", "versionEndIncluding": "22031", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:qnudpvcpu\\(n\\=04\\/06\\/13\\/2\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "6136D778-C9AB-49C2-A90C-9281B34308EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:lncpu\\(-p\\)\\(n\\=02\\/06\\/26\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACB71CE-71B7-442C-A44F-B9DF138C45F7", "versionEndIncluding": "22051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:lncpu\\(-p\\)\\(n\\=02\\/06\\/26\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC9C7BE-9D93-477D-B560-EAB4367A4844", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-\\(p\\)bt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAF171-F382-4393-A326-D43D8F8BB55B", "versionEndIncluding": "22051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-\\(p\\)bt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE019E69-01F5-4AC8-BE72-48A7B0FD0C56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rncpu\\(n\\=00\\/01\\/02\\)t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D83880E-6DBE-4D64-B467-744F89C42743", "versionEndIncluding": "18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rncpu\\(n\\=00\\/01\\/02\\)t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E83D77-A204-406C-AC54-CB97A66090C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rncpu\\(n\\=04\\/08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4AF8ADC-ED05-43D2-AF6D-868737E4D1A8", "versionEndIncluding": "50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rncpu\\(n\\=04\\/08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "0B2EE57C-3023-4071-BE28-8B42BD181EA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnencpu\\(n\\=04\\/08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6937B45E-B23C-4DE1-A926-3529B4154A03", "versionEndIncluding": "50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnencpu\\(n\\=04\\/08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "48C947EF-B119-440B-A47A-0B84A0087D30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnsfcpu_\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7ABBACF-10F8-4729-8D3A-A9C5BDB961A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnsfcpu_\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "C5CDD376-A0AD-4924-89F1-F04EBCA9C020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnpcpu\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E575079C-E69B-4A10-86F4-3440F9BAEBCE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnpcpu\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "1A5ABD37-C45D-4D7E-A93B-F9EA2544BA9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rnpsfcpu\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4B6D8B2-6E4F-437D-95A4-A24BFBFF7350", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rnpsfcpu\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "586B69F2-7276-437F-A69C-30B26ECB6B18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/d_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "F319764C-436E-4B29-9224-4A9BFAB21A7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBFA917-5DCF-4B0C-8C32-AC384FB880AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "7F895CD0-E081-49AB-84F9-B5F7C60921A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFE160B-32CC-4529-AD35-7467A32B609E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/ds-ts_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "616147FF-B8C0-45DA-B398-B0C15C44BAAE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/ds-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4B64FFA-59CE-46E9-B240-F083B332BFD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss-ts_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "BD5D4DAB-0262-4D99-8164-1BF5FC36B8B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "2122A970-5A7D-40A6-BB97-622B695713ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "BBE714C4-7121-43BD-894B-274F25F01BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F4BA009-4F0A-427C-9D4A-F8A128F5F8C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mr\\/ds-ts_firmware:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "B7A24D5B-FE5C-4263-A313-0EE0A6B13E41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mr\\/ds-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "6319D639-CC7B-414E-9DCB-F9D427E8FEF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "78F21B67-1550-4575-A6ED-342903CDB8D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B284B91-7571-4614-A721-676D1972E2D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/ess_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "653A0628-9267-4C71-AB2C-D89107171D37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D8A69D9-DE42-4953-AD81-40EF7A003823", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "8A5F3391-4B93-442F-857E-2B8717E93360", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B0AA6C3-68CC-454B-A959-707BB20F4E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "4C0617ED-28FF-4D7A-B246-F23292699021", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ED5C2F9-C203-40FD-B15C-F91A68FA0DCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/ess_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "1A895C09-2DD4-451F-85A2-A77AE1CA36EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A38E527-6290-49AE-885A-21C4FC77EE96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "5A4B25D0-D814-42F5-A91A-A7DFF9D6E1ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CAF8ED8-B265-4FC5-91AE-CFA4C282E27F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "0C56BC76-12CB-4B1C-A3D1-004DD311110B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F5B2760-4E56-4FAA-A723-BB7CC28FAFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/ess_firmware:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "B9705681-362F-4F8E-BC42-884A58C3A042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7625B11E-0A91-46D2-8952-AC0BA956D7A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1AC602-30AB-461B-A2BF-5310A33C36F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet:-:*:*:*:*:*:*:*", "matchCriteriaId": "1050809B-A058-451E-A62B-2E1707B3887E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet\\/ip_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F30B0C7E-D11C-4BD8-A864-E6614DC79B0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet\\/ip:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF5786BC-2E60-45A5-AD11-21CCAAFDDAAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet-adp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86E3E631-A5CB-48EF-ACDF-5D936E20E517", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet-adp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5DA247C-6A4B-4813-BABE-9420919C69EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD5F9558-9BE3-4798-8676-0D547240FF8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FDA7E6C-BFBF-4D78-8552-B2B3E6D9987B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F009EDE-0541-4E03-964D-8729DFEC2D4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F172545-1962-4611-AF12-C626B0F765FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CE77F12-BB13-4E48-B047-4725B89544FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "5766FC7F-312E-466E-9D1D-2C3D834A2B19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E250D61-D30E-4902-9A3E-C964E3972998", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BC58D73-605B-4656-A93F-015178A11776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E0F199-6BF9-469E-8531-F5855F4CAC0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "A13FA80E-2FCE-43EE-A5F9-01847762DE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C5D511-C2FB-48D6-9546-D20C8320098F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6709317-170A-4146-8D34-8A36BB46CAB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C46851F9-1EE9-409A-8651-87B3A37F2C8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA061AF-EC9E-4490-98B0-4397271B6AFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D96213-DF83-4985-BB51-B4ED181B338A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1374CFE-25E0-4357-B880-9C52BEE2219C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED616F78-DAAD-4F67-BEBE-3A14D6002650", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EEA4C4A-0191-4A2C-B56F-E70475910A03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5940C5A4-254F-4BBC-A65F-A7B07B61B1C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B69421D2-A453-43A8-A8D8-5E0B73F7B24A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D5F69E-3AB7-434A-9476-11A2D5C4C54C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BBBBCC7-AC22-49C0-B0C0-8D89E633AB74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "506ACCE1-28D0-4983-89F2-DC969D6C5EC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "24E0AE74-DF57-4461-9A91-11F31459EC68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7D2DA26-04D4-41AC-A00B-EE87780235B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBC7773-96DA-433A-ABB8-845B19168EBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50FCB926-E9C4-49F1-B657-F7E009EEE307", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "010DBD73-40FF-4353-9D11-CE81C4D14EDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6CECFB-40F8-4B99-AF07-1FE874B7565C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB590D55-DA7F-4543-99AA-1A1979F73E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F7A4438-C9CB-46BB-B1ED-FE6069497A52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B69A0E1-E9FA-4C5C-810F-8D3CEC959C20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E0F199-6BF9-469E-8531-F5855F4CAC0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "A13FA80E-2FCE-43EE-A5F9-01847762DE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71C5D511-C2FB-48D6-9546-D20C8320098F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6709317-170A-4146-8D34-8A36BB46CAB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C46851F9-1EE9-409A-8651-87B3A37F2C8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA061AF-EC9E-4490-98B0-4397271B6AFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D96213-DF83-4985-BB51-B4ED181B338A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1374CFE-25E0-4357-B880-9C52BEE2219C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED616F78-DAAD-4F67-BEBE-3A14D6002650", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EEA4C4A-0191-4A2C-B56F-E70475910A03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5940C5A4-254F-4BBC-A65F-A7B07B61B1C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*", "matchCriteriaId": "B69421D2-A453-43A8-A8D8-5E0B73F7B24A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D5F69E-3AB7-434A-9476-11A2D5C4C54C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BBBBCC7-AC22-49C0-B0C0-8D89E633AB74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "506ACCE1-28D0-4983-89F2-DC969D6C5EC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "24E0AE74-DF57-4461-9A91-11F31459EC68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-32_mt\\/dss_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43F233A3-B233-4112-93AA-6EA6638CBB77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-32_mt\\/dss:-:*:*:*:*:*:*:*", "matchCriteriaId": "16193E36-7987-45EB-AFBE-AFB360043E67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "686B0F97-14C8-48A6-A25F-DF3BC6A0DA07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1644E1-F748-46A3-8E09-FF5D53FD046F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A00A164-30D7-45BF-8CB4-00F18569F488", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8ACC832-E1EC-46DA-A2D1-CF1A3791A885", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-p502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0044A99C-4DAD-4593-B329-C3FFE706F8A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-p502:-:*:*:*:*:*:*:*", "matchCriteriaId": "69BA96DC-C462-4286-AE0E-32D141017E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fx5-cclgn-ms_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "671454B2-0474-479F-9F1E-EFCFAC01882E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fx5-cclgn-ms:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE1B348-9F41-40EC-B1FC-D5919F332815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:iu1-1m20-d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "714615F1-05A9-4D62-8671-F76CD1380C5A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:iu1-1m20-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "680B7B83-9F76-4C1F-B87A-F7049A0C46E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:le7-40gu-l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E4FD707-55B1-4A9C-9528-694C1008316B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:le7-40gu-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "41477864-1A55-4547-936A-29D6504F0D3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:got2000_series_gt21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "16EAF851-CD95-4DD7-9BA0-FBBE90F7339E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:got2000_series_gt21:-:*:*:*:*:*:*:*", "matchCriteriaId": "0873DFF7-9627-482D-A4A9-72F8E26ACBB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:got_simple_series_gs21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F5BF7B0-75CE-481B-88E3-248D47CC19F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:got_simple_series_gs21:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D30700D-F1DC-46B1-8785-7E24721264D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:got1000_series_gt14_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D68C2E9-3D0A-466B-9476-BE8110EC27E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:got1000_series_gt14:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3BD1AB4-3A3D-46CD-B613-3E3613AAA273", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:gt25-j71gn13-t2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44078605-B592-48CC-9F91-F1B745212D78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:gt25-j71gn13-t2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDCE2B83-0CBA-447A-8616-780301853AC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a820-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A70F1DC9-4930-4A99-BAC7-20F391693641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a820-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "64F6D4E4-CFC1-4CD4-92B9-738A062612D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a840-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "689C466A-5CA6-4413-8BD6-CCFDBABC006A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a840-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD00D598-4BEA-4E9B-9558-E80E22683C2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a860-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC34BC7-C4E4-4D3B-BAD8-8A77F44AF205", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a860-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "75275274-2442-4372-B0DD-8AB50ABF08D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a842-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D3F579C-C934-4589-90C2-FA1132104726", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a842-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1615F6C9-3C1E-47F0-9B61-607DCBAE7B50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a862-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE896C56-DBD2-4050-9AB0-757F52FE0DBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a862-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "08BBF6C1-F3DC-4E07-91A8-82D99BCE7E68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f820-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B923961-A068-4BE4-9C4C-D4F05A8E4A76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f820-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD15A99-5F0A-49B7-82E4-59B1F8ADD94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f840-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B451C55F-DCCC-4C26-BB79-CDBFB9261B9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f840-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB7232B-97CB-4820-A418-2CFEF95CED04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f860-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2735CEBA-9D80-4068-80D4-C5E2B46EB20E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f860-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDDBB50-1EAF-47E1-9DF0-9BA9433F3D47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f842-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FDBDB8D-4019-462E-9D5D-FE5BB57B2F13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f842-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAE513C7-3A83-4B34-A986-016F0AD5216C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-f862-e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFE7D90D-4E2D-4E62-83ED-CEEC9BC58378", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-f862-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "287546A0-141B-4A76-9B04-6914FF31B1A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-a8ncge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6DD95FF-BA97-45E9-86E5-A1ED73395759", "versionEndIncluding": "2020-08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-a8ncge:-:*:*:*:*:*:*:*", "matchCriteriaId": "99159924-7D0D-4E0D-A212-1B997A58B791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-e800-epa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD834CCD-0D6A-4BA7-8CF1-CE3F358D80DD", "versionEndIncluding": "2020-07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-e800-epa:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D9C957-5A2F-46EC-B82C-6C0A36EB4A3F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:fr-e800-epb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "753A00F4-4E1C-400D-969C-CB187DE76467", "versionEndIncluding": "2020-07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:fr-e800-epb:-:*:*:*:*:*:*:*", "matchCriteriaId": "A448590A-35B3-4DB5-AEE6-5EBAE325920F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr12fh:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A6D0905-EEF6-4386-BE37-C138A722D04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr20fh\\(n\\=1\\,2\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "F0AF6F96-A8F3-4F1C-8BF6-BFADE4ECC872", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr3fh:*:*:*:*:*:*:*:*", "matchCriteriaId": "D72D7D59-109B-4DD5-A59F-2D93D97FD69A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr6fh:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF939B93-2A02-4879-943E-29FB45173F1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:mr-je-c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "449AF664-6DF7-46D5-8508-CA59D7BD9661", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:mr-je-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C350628-57BA-4E37-A15D-0B19FBE423AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:mr-j4-tm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C702434-90C9-47B2-B9EF-F9AFD847D8D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:mr-j4-tm:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B10997-62CF-4512-ABB2-A679E77245AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." }, { "lang": "es", "value": "M\u00faltiples productos de Mitsubishi Electric, son vulnerables a suplantaciones de un dispositivo leg\u00edtimo por parte de un actor malicioso, lo que puede permitir a un atacante ejecutar comandos arbitrarios remotamente" } ], "id": "CVE-2020-16226", "lastModified": "2024-11-21T05:06:58.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-05T18:15:13.133", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-342" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DA6E8D4-26B3-44EA-94EE-D2ABD0E34D5F", "versionEndIncluding": "65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r04encpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71105F2E-5D80-484B-AE91-964EE6BB00B7", "versionEndIncluding": "65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r04encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5862905-F77D-4DEE-88A8-59893362936F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r08encpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "882C402E-D0A4-46F9-B983-B86EBCB24E19", "versionEndIncluding": "65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r08encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B85DAD9-7F5B-4740-94A3-94835D82CE3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r16encpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "054189D9-B6C3-487F-9FA4-97E2D69C69DD", "versionEndIncluding": "65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r16encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F7DE17-AA44-4E78-B07B-3D9F641DF445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r32encpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "417F4AD4-8FF6-4804-A453-0BA857B68BED", "versionEndIncluding": "65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r32encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "9546A301-8039-4D42-B1A2-AAF6C3C17203", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mitsubishielectric:r120encpu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF292C53-458C-4DE7-916C-ABD395EBF32B", "versionEndIncluding": "65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mitsubishielectric:r120encpu:-:*:*:*:*:*:*:*", "matchCriteriaId": "411C7828-D7C7-4B42-82E3-CAC21C15951C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version \"65\" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version \"65\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery." }, { "lang": "es", "value": "Vulnerabilidad de Validaci\u00f3n de Entrada Incorrecta en Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Versi\u00f3n de firmware \"65\" y anteriores y Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware versi\u00f3n \"65\" y anteriores permite una un atacante remoto no autenticado provoque una condici\u00f3n de Denegaci\u00f3n de Servicio mediante el env\u00edo de paquetes especialmente manipulados. Es necesario reiniciar el sistema para la recuperaci\u00f3n." } ], "id": "CVE-2022-40265", "lastModified": "2024-11-21T07:21:09.477", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-30T01:15:09.873", "references": [ { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU94702422" }, { "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-017_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU94702422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-017_en.pdf" } ], "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }