ID

VAR-202011-1261


CVE

CVE-2020-5668


TITLE

Made by Mitsubishi Electric  MELSEC iQ-R  Resource exhaustion vulnerabilities in the series

Trust: 0.8

sources: JVNDB: JVNDB-2020-009595

DESCRIPTION

Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet. Provided by Mitsubishi Electric Corporation MELSEC iQ-R Resource exhaustion vulnerabilities in series units (CWE-400) Exists This vulnerability information is provided by the developer for the purpose of making it known to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.Crafted by a remote third party SLMP Receiving packets can have the following effects: * CPU In the case of a unit, an error occurs and program execution and communication interfere with service operation. (DoS) Become in a state * CPU In the case of other than the unit, communication via the unit interferes with service operation. (DoS) In addition, a reset is required for recovery

Trust: 1.62

sources: NVD: CVE-2020-5668 // JVNDB: JVNDB-2020-009595

AFFECTED PRODUCTS

vendor:mitsubishielectricmodel:r32cpuscope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:rj71en71scope:lteversion:47

Trust: 1.0

vendor:mitsubishielectricmodel:r16pcpuscope:lteversion:25

Trust: 1.0

vendor:mitsubishielectricmodel:r01cpuscope:lteversion:19

Trust: 1.0

vendor:mitsubishielectricmodel:rj71gp21s-sxscope:lteversion:47

Trust: 1.0

vendor:mitsubishielectricmodel:rj71c24-r4scope:lteversion:47

Trust: 1.0

vendor:mitsubishielectricmodel:r00cpuscope:lteversion:19

Trust: 1.0

vendor:mitsubishielectricmodel:r08cpuscope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:r32sfcpuscope:lteversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:rj71c24-r2scope:lteversion:47

Trust: 1.0

vendor:mitsubishielectricmodel:r04cpuscope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:r08psfcpuscope:lteversion:06

Trust: 1.0

vendor:mitsubishielectricmodel:r16psfcpuscope:lteversion:06

Trust: 1.0

vendor:mitsubishielectricmodel:r120pcpuscope:lteversion:25

Trust: 1.0

vendor:mitsubishielectricmodel:r32pcpuscope:lteversion:25

Trust: 1.0

vendor:mitsubishielectricmodel:r120cpuscope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:r02cpuscope:lteversion:19

Trust: 1.0

vendor:mitsubishielectricmodel:r32psfcpuscope:lteversion:06

Trust: 1.0

vendor:mitsubishielectricmodel:rj71gf11-t2scope:lteversion:47

Trust: 1.0

vendor:mitsubishielectricmodel:rj72gf15-t2scope:lteversion:07

Trust: 1.0

vendor:mitsubishielectricmodel:r08sfcpuscope:lteversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:r16sfcpuscope:lteversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:r16cpuscope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:r120sfcpuscope:lteversion:22

Trust: 1.0

vendor:mitsubishielectricmodel:rj71gn11-t2scope:lteversion:11

Trust: 1.0

vendor:mitsubishielectricmodel:r08pcpuscope:lteversion:25

Trust: 1.0

vendor:mitsubishielectricmodel:r120psfcpuscope:lteversion:06

Trust: 1.0

vendor:mitsubishielectricmodel:rj71gp21-sxscope:lteversion:47

Trust: 1.0

vendor:三菱電機model:melsec iq-r シリーズscope:eqversion: -

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series rj71gp21s-sx firmware "47" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series rj71gp21-sx firmware "47" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:eqversion:melsec iq-r series rj71gn11-t2 firmware "11" and later

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series rj72gf15-t2 firmware "07" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series r00/01/02cpu firmware "19" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series rj71en71 firmware "47" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series r08/16/32/120psfcpu firmware "06" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope: - version: -

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:eqversion:melsec iq-r series rj71c24 (-r2/r4) all s

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series r08/16/32/120sfcpu firmware "22" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series rj71gf11-t2 firmware "47" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series r08/16/32/120pcpu firmware "25" and earlier

Trust: 0.8

vendor:三菱電機model:melsec iq-r シリーズscope:lteversion:melsec iq-r series r04/08/16/32/120 (en) cpu firmware "51" and earlier

Trust: 0.8

sources: JVNDB: JVNDB-2020-009595 // NVD: CVE-2020-5668

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2020-5668
value: HIGH

Trust: 1.0

IPA: JVNDB-2020-009595
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202011-1663
value: HIGH

Trust: 0.6

NVD: CVE-2020-5668
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2020-5668
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

IPA: JVNDB-2020-009595
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-009595 // CNNVD: CNNVD-202011-1663 // NVD: CVE-2020-5668

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:Resource exhaustion (CWE-400) [IPA Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-009595 // NVD: CVE-2020-5668

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202011-1663

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202011-1663

CONFIGURATIONS

sources: NVD: CVE-2020-5668

PATCH

title:MELSEC iQ-R Of the series Ethernet Denial of service on port  (DoS)  Vulnerabilityurl:https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf

Trust: 0.8

title:Mitsubishi Electric MELSEC iQ-R series Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=137118

Trust: 0.6

sources: JVNDB: JVNDB-2020-009595 // CNNVD: CNNVD-202011-1663

EXTERNAL IDS

db:JVNid:JVNVU95980140

Trust: 2.4

db:ICS CERTid:ICSA-20-324-05

Trust: 2.4

db:NVDid:CVE-2020-5668

Trust: 2.4

db:JVNDBid:JVNDB-2020-009595

Trust: 0.8

db:AUSCERTid:ESB-2020.4117

Trust: 0.6

db:CNNVDid:CNNVD-202011-1663

Trust: 0.6

sources: JVNDB: JVNDB-2020-009595 // CNNVD: CNNVD-202011-1663 // NVD: CVE-2020-5668

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05

Trust: 3.0

url:https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf

Trust: 1.6

url:https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf

Trust: 1.6

url:https://jvn.jp/vu/jvnvu95980140/index.html

Trust: 1.6

url:https://jvn.jp/vu/jvnvu95980140

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.4117/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-5668

Trust: 0.6

sources: JVNDB: JVNDB-2020-009595 // CNNVD: CNNVD-202011-1663 // NVD: CVE-2020-5668

CREDITS

Xiaofei.Zhang reported this vulnerability to Mitsubishi Electric.

Trust: 0.6

sources: CNNVD: CNNVD-202011-1663

SOURCES

db:JVNDBid:JVNDB-2020-009595
db:CNNVDid:CNNVD-202011-1663
db:NVDid:CVE-2020-5668

LAST UPDATE DATE

2022-05-04T09:59:40.179000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-009595date:2021-09-15T06:01:00
db:CNNVDid:CNNVD-202011-1663date:2021-12-20T00:00:00
db:NVDid:CVE-2020-5668date:2022-04-29T13:21:00

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-009595date:2020-11-20T00:00:00
db:CNNVDid:CNNVD-202011-1663date:2020-11-19T00:00:00
db:NVDid:CVE-2020-5668date:2020-11-20T04:15:00