ID

VAR-201902-0127


CVE

CVE-2019-6535


TITLE

plural Mitsubishi Electric Q Vulnerability related to resource depletion in series products

Trust: 0.8

sources: JVNDB: JVNDB-2019-001917

DESCRIPTION

Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash. plural Mitsubishi Electric Q Series products are vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Mitsubishi Electric MELSEC-Q Series PLCs are prone to an remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. Misubishi Electric Q03UDVCPU, etc. are all PLC (programmable logic controller) products of Japan's Mitsubishi Electric (Misubishi Electric) company. Security flaws exist in several Misubishi products. A remote attacker could exploit this vulnerability by sending a specially crafted packet to cause Ethernet to stop communicating. The following products are affected: Misubishi Q03UDVCPU; Q04UDVCPU; Q06UDVCPU; Q13UDVCPU; Q26UDPVCPU; Q03UDECPU;

Trust: 1.98

sources: NVD: CVE-2019-6535 // JVNDB: JVNDB-2019-001917 // BID: 106771 // VULHUB: VHN-157970

AFFECTED PRODUCTS

vendor:mitsubishielectricmodel:q50udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q26udpvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q04udvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q04udpvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q13udpvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q04udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q26udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q10udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q06udvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q20udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q03udvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q06udpvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q13udvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q100udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q26udvcpuscope:lteversion:20081

Trust: 1.0

vendor:mitsubishielectricmodel:q13udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q03udecpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishielectricmodel:q06udehcpuscope:lteversion:20101

Trust: 1.0

vendor:mitsubishi electricmodel:q03udecpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q03udvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q04udpvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q04udvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q06udpvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q06udvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q13udpvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q13udvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q26udpvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishi electricmodel:q26udvcpuscope: - version: -

Trust: 0.8

vendor:mitsubishimodel:electric q04/06/13/26udpvcpuscope:eqversion:20081

Trust: 0.3

vendor:mitsubishimodel:electric q04/06/10/13/20/26/50/100udehcpuscope:eqversion:20101

Trust: 0.3

vendor:mitsubishimodel:electric q03udecpuscope:eqversion:20101

Trust: 0.3

vendor:mitsubishimodel:electric q03/04/06/13/26udvcpuscope:eqversion:20081

Trust: 0.3

sources: BID: 106771 // JVNDB: JVNDB-2019-001917 // NVD: CVE-2019-6535

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6535
value: HIGH

Trust: 1.0

NVD: CVE-2019-6535
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201901-973
value: HIGH

Trust: 0.6

VULHUB: VHN-157970
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6535
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-157970
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6535
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-6535
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-157970 // JVNDB: JVNDB-2019-001917 // CNNVD: CNNVD-201901-973 // NVD: CVE-2019-6535

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-157970 // JVNDB: JVNDB-2019-001917 // NVD: CVE-2019-6535

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-973

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201901-973

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001917

PATCH

title:MELSEC-Qシリーズurl:https://www.mitsubishielectric.co.jp/fa/products/cnt/plcq/items/index.html

Trust: 0.8

title:Multiple Misubishi Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89040

Trust: 0.6

sources: JVNDB: JVNDB-2019-001917 // CNNVD: CNNVD-201901-973

EXTERNAL IDS

db:NVDid:CVE-2019-6535

Trust: 2.8

db:ICS CERTid:ICSA-19-029-02

Trust: 2.8

db:BIDid:106771

Trust: 2.0

db:JVNDBid:JVNDB-2019-001917

Trust: 0.8

db:CNNVDid:CNNVD-201901-973

Trust: 0.7

db:SEEBUGid:SSVID-98808

Trust: 0.1

db:VULHUBid:VHN-157970

Trust: 0.1

sources: VULHUB: VHN-157970 // BID: 106771 // JVNDB: JVNDB-2019-001917 // CNNVD: CNNVD-201901-973 // NVD: CVE-2019-6535

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-19-029-02

Trust: 2.8

url:http://www.securityfocus.com/bid/106771

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-6535

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6535

Trust: 0.8

url:http://www.mitsubishi-automation.com/

Trust: 0.3

sources: VULHUB: VHN-157970 // BID: 106771 // JVNDB: JVNDB-2019-001917 // CNNVD: CNNVD-201901-973 // NVD: CVE-2019-6535

CREDITS

Tri Quach of Amazon???s Customer Fulfillment Technology Security (CFTS),Tri Quach of Amazon???s Customer Fulfillment Technology Security (CFTS)

Trust: 0.6

sources: CNNVD: CNNVD-201901-973

SOURCES

db:VULHUBid:VHN-157970
db:BIDid:106771
db:JVNDBid:JVNDB-2019-001917
db:CNNVDid:CNNVD-201901-973
db:NVDid:CVE-2019-6535

LAST UPDATE DATE

2024-08-14T15:07:44.907000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-157970date:2023-01-31T00:00:00
db:BIDid:106771date:2019-01-29T00:00:00
db:JVNDBid:JVNDB-2019-001917date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201901-973date:2019-10-17T00:00:00
db:NVDid:CVE-2019-6535date:2023-01-31T21:03:58.657

SOURCES RELEASE DATE

db:VULHUBid:VHN-157970date:2019-02-05T00:00:00
db:BIDid:106771date:2019-01-29T00:00:00
db:JVNDBid:JVNDB-2019-001917date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201901-973date:2019-01-30T00:00:00
db:NVDid:CVE-2019-6535date:2019-02-05T19:29:00.243