ID

VAR-202011-1248


CVE

CVE-2020-5652


TITLE

Made by Mitsubishi Electric  MELSEC iQ-R , Q  and  L  Resource exhaustion vulnerability in the series

Trust: 0.8

sources: JVNDB: JVNDB-2020-009428

DESCRIPTION

Uncontrolled resource consumption vulnerability in Ethernet Port on MELSEC iQ-R, Q and L series CPU modules (R 00/01/02 CPU firmware versions '20' and earlier, R 04/08/16/32/120 (EN) CPU firmware versions '52' and earlier, R 08/16/32/120 SFCPU firmware versions '22' and earlier, R 08/16/32/120 PCPU all versions, R 08/16/32/120 PSFCPU all versions, R 16/32/64 MTCPU all versions, Q03 UDECPU, Q 04/06/10/13/20/26/50/100 UDEHCPU serial number '22081' and earlier , Q 03/04/06/13/26 UDVCPU serial number '22031' and earlier, Q 04/06/13/26 UDPVCPU serial number '22031' and earlier, Q 172/173 DCPU all versions, Q 172/173 DSCPU all versions, Q 170 MCPU all versions, Q 170 MSCPU all versions, L 02/06/26 CPU (-P) and L 26 CPU - (P) BT all versions) allows a remote unauthenticated attacker to stop the Ethernet communication functions of the products via a specially crafted packet, which may lead to a denial of service (DoS) condition . Provided by Mitsubishi Electric Corporation MELSEC iQ-R , Q and L Of the series CPU The unit has a resource exhaustion vulnerability. (CWE-400) exists. This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.When a packet crafted by a remote third party is received, Ethernet Communications disrupt service operations (DoS) may become a state. A reset is required for recovery

Trust: 1.71

sources: NVD: CVE-2020-5652 // JVNDB: JVNDB-2020-009428 // VULMON: CVE-2020-5652

AFFECTED PRODUCTS

vendor:mitsubishielectricmodel:melsec q-q10udehcpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q13udpvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r01cpuscope:eqversion:20

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r32pcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r120encpuscope:eqversion:52

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r08psfcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q06udehcpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r08encpuscope:eqversion:52

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q03udvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q04udvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q26udvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r32psfcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q03udecpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec l26cpu-pbtscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q173dscpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q173dcpu-s1scope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec l06cpu-pscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q13udvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r120psfcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q04udehcpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q13udehcpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r120pcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q26udehcpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r04encpuscope:eqversion:52

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q100udehcpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-qmr-mq100scope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec l26cpu-pscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r16encpuscope:eqversion:52

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r00cpuscope:eqversion:20

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q04udpvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r32mtcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q170mscpu-s1scope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q26udpvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q172dcpu-s1scope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec l02cpu-pscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r32sfcpuscope:eqversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q172dscpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q06udpvcpuscope:eqversion:22031

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r08pcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r16sfcpuscope:eqversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r02cpuscope:eqversion:20

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q50udehcpuscope:eqversion:22081

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r32encpuscope:eqversion:52

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r64mtcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r16mtcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r08sfcpuscope:eqversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r16psfcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q170mcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r120sfcpuscope:eqversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r16pcpuscope:eqversion: -

Trust: 1.0

vendor:mitsubishielectricmodel:melsec q-q20udehcpuscope:eqversion:22081

Trust: 1.0

vendor:三菱電機model:melsec l シリーズscope: - version: -

Trust: 0.8

vendor:三菱電機model:melsec q シリーズscope: - version: -

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-009428 // NVD: CVE-2020-5652

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-5652
value: HIGH

Trust: 1.0

IPA: JVNDB-2020-009428
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202010-1668
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-5652
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2020-5652
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

IPA: JVNDB-2020-009428
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-009428 // CNNVD: CNNVD-202010-1668 // NVD: CVE-2020-5652

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:Resource exhaustion (CWE-400) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-009428 // NVD: CVE-2020-5652

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-1668

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202010-1668

PATCH

title:MELSEC iQ-R , Q  and  L  series  CPU  Of the unit  Ethernet  Denial of service on port  (DoS)  Vulnerabilityurl:https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-013.pdf

Trust: 0.8

title:Multiple Mitsubishi Electric Product resource management error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=133994

Trust: 0.6

sources: JVNDB: JVNDB-2020-009428 // CNNVD: CNNVD-202010-1668

EXTERNAL IDS

db:NVDid:CVE-2020-5652

Trust: 3.3

db:JVNid:JVNVU96558207

Trust: 2.5

db:ICS CERTid:ICSA-20-303-01

Trust: 1.4

db:JVNDBid:JVNDB-2020-009428

Trust: 0.8

db:AUSCERTid:ESB-2020.3753

Trust: 0.6

db:CNNVDid:CNNVD-202010-1668

Trust: 0.6

db:VULMONid:CVE-2020-5652

Trust: 0.1

sources: VULMON: CVE-2020-5652 // JVNDB: JVNDB-2020-009428 // CNNVD: CNNVD-202010-1668 // NVD: CVE-2020-5652

REFERENCES

url:https://jvn.jp/vu/jvnvu96558207/index.html

Trust: 1.7

url:https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-013.pdf

Trust: 1.7

url:https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-013_en.pdf

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-5652

Trust: 1.4

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-303-01

Trust: 1.4

url:https://jvn.jp/vu/jvnvu96558207

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.3753/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2020-5652 // JVNDB: JVNDB-2020-009428 // CNNVD: CNNVD-202010-1668 // NVD: CVE-2020-5652

CREDITS

Mitsubishi Electric reported this vulnerability to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202010-1668

SOURCES

db:VULMONid:CVE-2020-5652
db:JVNDBid:JVNDB-2020-009428
db:CNNVDid:CNNVD-202010-1668
db:NVDid:CVE-2020-5652

LAST UPDATE DATE

2024-11-23T21:51:08.688000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-5652date:2020-11-19T00:00:00
db:JVNDBid:JVNDB-2020-009428date:2024-09-06T06:44:00
db:CNNVDid:CNNVD-202010-1668date:2022-01-14T00:00:00
db:NVDid:CVE-2020-5652date:2024-11-21T05:34:25.693

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-5652date:2020-11-02T00:00:00
db:JVNDBid:JVNDB-2020-009428date:2020-11-05T00:00:00
db:CNNVDid:CNNVD-202010-1668date:2020-10-29T00:00:00
db:NVDid:CVE-2020-5652date:2020-11-02T21:15:33.697