Vulnerabilites related to mitsubishielectric - qj71e71-100
Vulnerability from fkie_nvd
Published
2020-10-05 18:15
Modified
2024-11-21 05:06
Severity ?
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
References
Impacted products
Vendor Product Version
mitsubishielectric qj71mes96_firmware *
mitsubishielectric qj71mes96 -
mitsubishielectric qj71ws96_firmware *
mitsubishielectric qj71ws96 -
mitsubishielectric q06ccpu-v_firmware *
mitsubishielectric q06ccpu-v -
mitsubishielectric q24dhccpu-v_firmware *
mitsubishielectric q24dhccpu-v -
mitsubishielectric q24dhccpu-vg_firmware *
mitsubishielectric q24dhccpu-vg -
mitsubishielectric r12ccpu-v_firmware *
mitsubishielectric r12ccpu-v -
mitsubishielectric rd55up06-v_firmware *
mitsubishielectric rd55up06-v -
mitsubishielectric rd55up12-v_firmware *
mitsubishielectric rd55up12-v -
mitsubishielectric rj71gn11-t2_firmware *
mitsubishielectric rj71gn11-t2 -
mitsubishielectric rj71en71_firmware *
mitsubishielectric rj71en71 -
mitsubishielectric qj71e71-100_firmware *
mitsubishielectric qj71e71-100 -
mitsubishielectric lj71e71-100_firmware *
mitsubishielectric lj71e71-100 -
mitsubishielectric qj71mt91_firmware *
mitsubishielectric qj71mt91 -
mitsubishielectric rd78gn\(n\=4\,8\,16\,32\,64\)_firmware *
mitsubishielectric rd78gn\(n\=4\,8\,16\,32\,64\) -
mitsubishielectric rd78ghv_firmware *
mitsubishielectric rd78ghv -
mitsubishielectric rd78ghw_firmware *
mitsubishielectric rd78ghw -
mitsubishielectric nz2gacp620-60_firmware *
mitsubishielectric nz2gacp620-60 -
mitsubishielectric nz2gacp620-300_firmware *
mitsubishielectric nz2gacp620-300 -
mitsubishielectric nz2ft-mt_firmware *
mitsubishielectric nz2ft-mt -
mitsubishielectric nz2ft-eip_firmware *
mitsubishielectric nz2ft-eip -
mitsubishielectric q03udecpu_firmware *
mitsubishielectric q03udecpu -
mitsubishielectric qnudehcpu\(n\=04\/06\/10\/13\/20\/26\/50\/100\)_firmware *
mitsubishielectric qnudehcpu\(n\=04\/06\/10\/13\/20\/26\/50\/100\) -
mitsubishielectric qnudvcpu\(n\=03\/04\/06\/13\/26\)_firmware *
mitsubishielectric qnudvcpu\(n\=03\/04\/06\/13\/26\) -
mitsubishielectric qnudpvcpu\(n\=04\/06\/13\/2\)_firmware *
mitsubishielectric qnudpvcpu\(n\=04\/06\/13\/2\) -
mitsubishielectric lncpu\(-p\)\(n\=02\/06\/26\)_firmware *
mitsubishielectric lncpu\(-p\)\(n\=02\/06\/26\) -
mitsubishielectric l26cpu-\(p\)bt_firmware *
mitsubishielectric l26cpu-\(p\)bt -
mitsubishielectric rncpu\(n\=00\/01\/02\)t_firmware *
mitsubishielectric rncpu\(n\=00\/01\/02\)t -
mitsubishielectric rncpu\(n\=04\/08\/16\/32\/120\)_firmware *
mitsubishielectric rncpu\(n\=04\/08\/16\/32\/120\) -
mitsubishielectric rnencpu\(n\=04\/08\/16\/32\/120\)_firmware *
mitsubishielectric rnencpu\(n\=04\/08\/16\/32\/120\) -
mitsubishielectric rnsfcpu_\(n\=08\/16\/32\/120\)_firmware *
mitsubishielectric rnsfcpu_\(n\=08\/16\/32\/120\) -
mitsubishielectric rnpcpu\(n\=08\/16\/32\/120\)_firmware *
mitsubishielectric rnpcpu\(n\=08\/16\/32\/120\) -
mitsubishielectric rnpsfcpu\(n\=08\/16\/32\/120\)_firmware *
mitsubishielectric rnpsfcpu\(n\=08\/16\/32\/120\) -
mitsubishielectric fx5uc-32mt\/d_firmware 1.210
mitsubishielectric fx5uc-32mt\/d -
mitsubishielectric fx5uc-32mt\/dss_firmware 1.210
mitsubishielectric fx5uc-32mt\/dss -
mitsubishielectric fx5uc-32mt\/ds-ts_firmware 1.210
mitsubishielectric fx5uc-32mt\/ds-ts -
mitsubishielectric fx5uc-32mt\/dss-ts_firmware 1.210
mitsubishielectric fx5uc-32mt\/dss-ts -
mitsubishielectric fx5uj-24mr\/es_firmware 1.000
mitsubishielectric fx5uj-24mr\/es -
mitsubishielectric fx5uc-32mr\/ds-ts_firmware 1.210
mitsubishielectric fx5uc-32mr\/ds-ts -
mitsubishielectric fx5uj-24mt\/es_firmware 1.000
mitsubishielectric fx5uj-24mt\/es -
mitsubishielectric fx5uj-24mt\/ess_firmware 1.000
mitsubishielectric fx5uj-24mt\/ess -
mitsubishielectric fx5uj-40mr\/es_firmware 1.000
mitsubishielectric fx5uj-40mr\/es -
mitsubishielectric fx5uj-40mt\/es_firmware 1.000
mitsubishielectric fx5uj-40mt\/es -
mitsubishielectric fx5uj-40mt\/ess_firmware 1.000
mitsubishielectric fx5uj-40mt\/ess -
mitsubishielectric fx5uj-60mr\/es_firmware 1.000
mitsubishielectric fx5uj-60mr\/es -
mitsubishielectric fx5uj-60mt\/es_firmware 1.000
mitsubishielectric fx5uj-60mt\/es -
mitsubishielectric fx5uj-60mt\/ess_firmware 1.000
mitsubishielectric fx5uj-60mt\/ess -
mitsubishielectric fx5-enet_firmware *
mitsubishielectric fx5-enet -
mitsubishielectric fx5-enet\/ip_firmware *
mitsubishielectric fx5-enet\/ip -
mitsubishielectric fx5-enet-adp_firmware *
mitsubishielectric fx5-enet-adp -
mitsubishielectric fx3g-14mr\/es_firmware *
mitsubishielectric fx3g-14mr\/es -
mitsubishielectric fx3g-14mt\/ess_firmware *
mitsubishielectric fx3g-14mt\/ess -
mitsubishielectric fx3g-14mr\/ds_firmware *
mitsubishielectric fx3g-14mr\/ds -
mitsubishielectric fx3g-14mt\/dss_firmware *
mitsubishielectric fx3g-14mt\/dss -
mitsubishielectric fx3g-24mr\/es_firmware *
mitsubishielectric fx3g-24mr\/es -
mitsubishielectric fx3g-24mt\/ess_firmware *
mitsubishielectric fx3g-24mt\/ess -
mitsubishielectric fx3g-24mr\/ds_firmware *
mitsubishielectric fx3g-24mr\/ds -
mitsubishielectric fx3g-24mt\/dss_firmware *
mitsubishielectric fx3g-24mt\/dss -
mitsubishielectric fx3g-40mr\/es_firmware *
mitsubishielectric fx3g-40mr\/es -
mitsubishielectric fx3g-40mt\/ess_firmware *
mitsubishielectric fx3g-40mt\/ess -
mitsubishielectric fx3g-40mr\/ds_firmware *
mitsubishielectric fx3g-40mr\/ds -
mitsubishielectric fx3g-40mt\/dss_firmware *
mitsubishielectric fx3g-40mt\/dss -
mitsubishielectric fx3g-60mr\/es_firmware *
mitsubishielectric fx3g-60mr\/es -
mitsubishielectric fx3g-60mt\/ess_firmware *
mitsubishielectric fx3g-60mt\/ess -
mitsubishielectric fx3g-60mr\/ds_firmware *
mitsubishielectric fx3g-60mr\/ds -
mitsubishielectric fx3g-60mt\/dss_firmware *
mitsubishielectric fx3g-60mt\/dss -
mitsubishielectric fx3g-24mr\/es_firmware *
mitsubishielectric fx3g-24mr\/es -
mitsubishielectric fx3g-24mt\/ess_firmware *
mitsubishielectric fx3g-24mt\/ess -
mitsubishielectric fx3g-24mr\/ds_firmware *
mitsubishielectric fx3g-24mr\/ds -
mitsubishielectric fx3g-24mt\/dss_firmware *
mitsubishielectric fx3g-24mt\/dss -
mitsubishielectric fx3g-40mr\/es_firmware *
mitsubishielectric fx3g-40mr\/es -
mitsubishielectric fx3g-40mt\/ess_firmware *
mitsubishielectric fx3g-40mt\/ess -
mitsubishielectric fx3g-40mr\/ds_firmware *
mitsubishielectric fx3g-40mr\/ds -
mitsubishielectric fx3g-40mt\/dss_firmware *
mitsubishielectric fx3g-40mt\/dss -
mitsubishielectric fx3g-32_mt\/dss_firmware *
mitsubishielectric fx3g-32_mt\/dss -
mitsubishielectric fx3u-enet_firmware *
mitsubishielectric fx3u-enet -
mitsubishielectric fx3u-enet-l_firmware *
mitsubishielectric fx3u-enet-l -
mitsubishielectric fx3u-enet-p502_firmware *
mitsubishielectric fx3u-enet-p502 -
mitsubishielectric fx5-cclgn-ms_firmware *
mitsubishielectric fx5-cclgn-ms -
mitsubishielectric iu1-1m20-d_firmware *
mitsubishielectric iu1-1m20-d -
mitsubishielectric le7-40gu-l_firmware *
mitsubishielectric le7-40gu-l -
mitsubishielectric got2000_series_gt21_firmware *
mitsubishielectric got2000_series_gt21 -
mitsubishielectric got_simple_series_gs21_firmware *
mitsubishielectric got_simple_series_gs21 -
mitsubishielectric got1000_series_gt14_firmware *
mitsubishielectric got1000_series_gt14 -
mitsubishielectric gt25-j71gn13-t2_firmware *
mitsubishielectric gt25-j71gn13-t2 -
mitsubishielectric fr-a820-e_firmware *
mitsubishielectric fr-a820-e -
mitsubishielectric fr-a840-e_firmware *
mitsubishielectric fr-a840-e -
mitsubishielectric fr-a860-e_firmware *
mitsubishielectric fr-a860-e -
mitsubishielectric fr-a842-e_firmware *
mitsubishielectric fr-a842-e -
mitsubishielectric fr-a862-e_firmware *
mitsubishielectric fr-a862-e -
mitsubishielectric fr-f820-e_firmware *
mitsubishielectric fr-f820-e -
mitsubishielectric fr-f840-e_firmware *
mitsubishielectric fr-f840-e -
mitsubishielectric fr-f860-e_firmware *
mitsubishielectric fr-f860-e -
mitsubishielectric fr-f842-e_firmware *
mitsubishielectric fr-f842-e -
mitsubishielectric fr-f862-e_firmware *
mitsubishielectric fr-f862-e -
mitsubishielectric fr-a8ncge_firmware *
mitsubishielectric fr-a8ncge -
mitsubishielectric fr-e800-epa_firmware *
mitsubishielectric fr-e800-epa -
mitsubishielectric fr-e800-epb_firmware *
mitsubishielectric fr-e800-epb -
mitsubishielectric conveyor_tracking_application_apr-ntr12fh -
mitsubishielectric conveyor_tracking_application_apr-ntr20fh\(n\=1\,2\) -
mitsubishielectric conveyor_tracking_application_apr-ntr3fh *
mitsubishielectric conveyor_tracking_application_apr-ntr6fh -
mitsubishielectric mr-je-c_firmware *
mitsubishielectric mr-je-c -
mitsubishielectric mr-j4-tm_firmware *
mitsubishielectric mr-j4-tm -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71mes96_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C7DBDF-F467-4310-8B65-EF611692202F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71mes96:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E9566C3-CFB4-4658-AFAE-ADD1B9DA9211",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71ws96_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4AB29EE-605F-4140-A84F-B82E7762D826",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71ws96:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39BAAFF-FF1F-4279-B501-E0A918CC54CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:q06ccpu-v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED3CA2D-EE3F-4281-883F-4A7FCB4CEE3B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:q06ccpu-v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E517BA2F-CF39-49C2-A68E-64A2CE17DBDE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E848004-A141-4C9F-9A6C-73A3BD7A6082",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "210A2E8A-BF20-43F5-BA07-CB662833DE1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:q24dhccpu-vg_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1FC6B1-F265-4565-95A7-1F3F55634C17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:q24dhccpu-vg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DF6F77-EEB5-4CB3-B041-7BA43F16E2E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56BCED50-FEC2-4F26-81AC-0C3C9BD12C4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:r12ccpu-v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B938943-DDD5-43DC-98A3-29D0E6AFBF85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rd55up06-v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF1853A1-8C0D-4EC0-BECC-A89D1CEFDFE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rd55up06-v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F5EF13-A273-459E-815B-F21C57D44204",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rd55up12-v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E5CCD36-42A4-4B7C-B5E1-23F6E4BB1DAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rd55up12-v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED862A7-87F7-4548-B2AB-2A3DB3ED1482",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rj71gn11-t2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3F3EDD1-A50F-4581-96D7-9577F9836574",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rj71gn11-t2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B5FE39-4540-4A95-ABA8-15F8EA545DE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rj71en71_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B038D8DD-BE83-4AEB-96DF-FAF9EA630222",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rj71en71:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD2CE10-A6DB-4642-8FA8-DD1AFA726EC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BAF2D41-713E-4EA6-A705-57963DBF1309",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD1EB30-B1FC-49CC-97D7-739AA5E92E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:lj71e71-100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFBF46E0-7580-48ED-AB04-490204FBBA33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:lj71e71-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF312DE0-1882-41A2-A2F6-BA4CB71837E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71mt91_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC6EE26-1644-45F7-8489-B6380FC493F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71mt91:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58095D28-F44C-4876-9B6F-6D1CFD3D602A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rd78gn\\(n\\=4\\,8\\,16\\,32\\,64\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B55521-A137-4A7F-839E-1B3DBCB7E313",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rd78gn\\(n\\=4\\,8\\,16\\,32\\,64\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE041A8C-11A7-4FAB-A363-49F429AEF24A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rd78ghv_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DCA431-9DA7-48B5-9107-86CA9DAD360E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rd78ghv:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12E5533D-15A8-471B-899B-FE9F9655EE8F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rd78ghw_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B9722D1-BAB9-4E43-8612-4B6496DD1AF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rd78ghw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B5C3119-7579-4623-8513-65A281BDF0D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:nz2gacp620-60_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A3B553-08E8-4415-BDAF-897181D5B11A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:nz2gacp620-60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB0F4E4-F634-4D0C-A693-AC48962C320B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:nz2gacp620-300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E791C3F4-D449-4B3B-B07D-A683D621B6A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:nz2gacp620-300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDD7EA6-1946-46DB-AD2B-2F778AB11AA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:nz2ft-mt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "071EB002-B837-48B0-8276-A8B0AA5D578E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:nz2ft-mt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "713AE73B-463A-4B2B-8B35-64FB0D53B416",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:nz2ft-eip_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F04BC6-17EA-4F6F-BB5B-C87FEE3CB59B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:nz2ft-eip:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5CF34B6-9CCF-491C-A327-A38D0BAC504D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:q03udecpu_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E5D21A-8561-45FE-88E1-725D3488AA22",
              "versionEndIncluding": "22081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:q03udecpu:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "946DA26E-A6B2-46F6-BA81-A92133124823",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qnudehcpu\\(n\\=04\\/06\\/10\\/13\\/20\\/26\\/50\\/100\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "503A8334-5C68-440E-B76D-5B834557C999",
              "versionEndIncluding": "22081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qnudehcpu\\(n\\=04\\/06\\/10\\/13\\/20\\/26\\/50\\/100\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94A82925-8D77-4914-924A-350CF77857A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qnudvcpu\\(n\\=03\\/04\\/06\\/13\\/26\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57284400-F051-4E3A-B019-B308EF4F4997",
              "versionEndIncluding": "22031",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qnudvcpu\\(n\\=03\\/04\\/06\\/13\\/26\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "745BC528-D8A3-4393-A267-0A4E2FB81603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qnudpvcpu\\(n\\=04\\/06\\/13\\/2\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EE5B71-EEAB-47E4-BCAB-1E81C40686B5",
              "versionEndIncluding": "22031",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qnudpvcpu\\(n\\=04\\/06\\/13\\/2\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6136D778-C9AB-49C2-A90C-9281B34308EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:lncpu\\(-p\\)\\(n\\=02\\/06\\/26\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ACB71CE-71B7-442C-A44F-B9DF138C45F7",
              "versionEndIncluding": "22051",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:lncpu\\(-p\\)\\(n\\=02\\/06\\/26\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC9C7BE-9D93-477D-B560-EAB4367A4844",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:l26cpu-\\(p\\)bt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FBAF171-F382-4393-A326-D43D8F8BB55B",
              "versionEndIncluding": "22051",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:l26cpu-\\(p\\)bt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE019E69-01F5-4AC8-BE72-48A7B0FD0C56",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rncpu\\(n\\=00\\/01\\/02\\)t_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D83880E-6DBE-4D64-B467-744F89C42743",
              "versionEndIncluding": "18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rncpu\\(n\\=00\\/01\\/02\\)t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E83D77-A204-406C-AC54-CB97A66090C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rncpu\\(n\\=04\\/08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4AF8ADC-ED05-43D2-AF6D-868737E4D1A8",
              "versionEndIncluding": "50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rncpu\\(n\\=04\\/08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B2EE57C-3023-4071-BE28-8B42BD181EA1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rnencpu\\(n\\=04\\/08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6937B45E-B23C-4DE1-A926-3529B4154A03",
              "versionEndIncluding": "50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rnencpu\\(n\\=04\\/08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48C947EF-B119-440B-A47A-0B84A0087D30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rnsfcpu_\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7ABBACF-10F8-4729-8D3A-A9C5BDB961A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rnsfcpu_\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CDD376-A0AD-4924-89F1-F04EBCA9C020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rnpcpu\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E575079C-E69B-4A10-86F4-3440F9BAEBCE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rnpcpu\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A5ABD37-C45D-4D7E-A93B-F9EA2544BA9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:rnpsfcpu\\(n\\=08\\/16\\/32\\/120\\)_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B6D8B2-6E4F-437D-95A4-A24BFBFF7350",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:rnpsfcpu\\(n\\=08\\/16\\/32\\/120\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "586B69F2-7276-437F-A69C-30B26ECB6B18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/d_firmware:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "F319764C-436E-4B29-9224-4A9BFAB21A7B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBBFA917-5DCF-4B0C-8C32-AC384FB880AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss_firmware:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F895CD0-E081-49AB-84F9-B5F7C60921A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFE160B-32CC-4529-AD35-7467A32B609E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/ds-ts_firmware:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "616147FF-B8C0-45DA-B398-B0C15C44BAAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/ds-ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B64FFA-59CE-46E9-B240-F083B332BFD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mt\\/dss-ts_firmware:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD5D4DAB-0262-4D99-8164-1BF5FC36B8B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mt\\/dss-ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2122A970-5A7D-40A6-BB97-622B695713ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mr\\/es_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE714C4-7121-43BD-894B-274F25F01BF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F4BA009-4F0A-427C-9D4A-F8A128F5F8C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uc-32mr\\/ds-ts_firmware:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7A24D5B-FE5C-4263-A313-0EE0A6B13E41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uc-32mr\\/ds-ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6319D639-CC7B-414E-9DCB-F9D427E8FEF2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/es_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F21B67-1550-4575-A6ED-342903CDB8D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B284B91-7571-4614-A721-676D1972E2D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-24mt\\/ess_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "653A0628-9267-4C71-AB2C-D89107171D37",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-24mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D8A69D9-DE42-4953-AD81-40EF7A003823",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mr\\/es_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5F3391-4B93-442F-857E-2B8717E93360",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B0AA6C3-68CC-454B-A959-707BB20F4E07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/es_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C0617ED-28FF-4D7A-B246-F23292699021",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED5C2F9-C203-40FD-B15C-F91A68FA0DCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-40mt\\/ess_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A895C09-2DD4-451F-85A2-A77AE1CA36EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-40mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A38E527-6290-49AE-885A-21C4FC77EE96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mr\\/es_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4B25D0-D814-42F5-A91A-A7DFF9D6E1ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CAF8ED8-B265-4FC5-91AE-CFA4C282E27F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/es_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C56BC76-12CB-4B1C-A3D1-004DD311110B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F5B2760-4E56-4FAA-A723-BB7CC28FAFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5uj-60mt\\/ess_firmware:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9705681-362F-4F8E-BC42-884A58C3A042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5uj-60mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7625B11E-0A91-46D2-8952-AC0BA956D7A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1AC602-30AB-461B-A2BF-5310A33C36F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1050809B-A058-451E-A62B-2E1707B3887E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet\\/ip_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30B0C7E-D11C-4BD8-A864-E6614DC79B0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet\\/ip:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5786BC-2E60-45A5-AD11-21CCAAFDDAAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5-enet-adp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E3E631-A5CB-48EF-ACDF-5D936E20E517",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5-enet-adp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DA247C-6A4B-4813-BABE-9420919C69EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/es_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD5F9558-9BE3-4798-8676-0D547240FF8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FDA7E6C-BFBF-4D78-8552-B2B3E6D9987B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/ess_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F009EDE-0541-4E03-964D-8729DFEC2D4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F172545-1962-4611-AF12-C626B0F765FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/ds_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE77F12-BB13-4E48-B047-4725B89544FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/ds:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5766FC7F-312E-466E-9D1D-2C3D834A2B19",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/dss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E250D61-D30E-4902-9A3E-C964E3972998",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC58D73-605B-4656-A93F-015178A11776",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E0F199-6BF9-469E-8531-F5855F4CAC0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13FA80E-2FCE-43EE-A5F9-01847762DE05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C5D511-C2FB-48D6-9546-D20C8320098F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6709317-170A-4146-8D34-8A36BB46CAB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46851F9-1EE9-409A-8651-87B3A37F2C8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA061AF-EC9E-4490-98B0-4397271B6AFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D96213-DF83-4985-BB51-B4ED181B338A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1374CFE-25E0-4357-B880-9C52BEE2219C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED616F78-DAAD-4F67-BEBE-3A14D6002650",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EEA4C4A-0191-4A2C-B56F-E70475910A03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5940C5A4-254F-4BBC-A65F-A7B07B61B1C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69421D2-A453-43A8-A8D8-5E0B73F7B24A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D5F69E-3AB7-434A-9476-11A2D5C4C54C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BBBBCC7-AC22-49C0-B0C0-8D89E633AB74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "506ACCE1-28D0-4983-89F2-DC969D6C5EC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E0AE74-DF57-4461-9A91-11F31459EC68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/es_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7D2DA26-04D4-41AC-A00B-EE87780235B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CBC7773-96DA-433A-ABB8-845B19168EBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/ess_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FCB926-E9C4-49F1-B657-F7E009EEE307",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "010DBD73-40FF-4353-9D11-CE81C4D14EDB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/ds_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E6CECFB-40F8-4B99-AF07-1FE874B7565C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/ds:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB590D55-DA7F-4543-99AA-1A1979F73E69",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/dss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7A4438-C9CB-46BB-B1ED-FE6069497A52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B69A0E1-E9FA-4C5C-810F-8D3CEC959C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E0F199-6BF9-469E-8531-F5855F4CAC0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13FA80E-2FCE-43EE-A5F9-01847762DE05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C5D511-C2FB-48D6-9546-D20C8320098F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6709317-170A-4146-8D34-8A36BB46CAB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46851F9-1EE9-409A-8651-87B3A37F2C8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FA061AF-EC9E-4490-98B0-4397271B6AFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D96213-DF83-4985-BB51-B4ED181B338A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1374CFE-25E0-4357-B880-9C52BEE2219C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED616F78-DAAD-4F67-BEBE-3A14D6002650",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EEA4C4A-0191-4A2C-B56F-E70475910A03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5940C5A4-254F-4BBC-A65F-A7B07B61B1C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69421D2-A453-43A8-A8D8-5E0B73F7B24A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19D5F69E-3AB7-434A-9476-11A2D5C4C54C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BBBBCC7-AC22-49C0-B0C0-8D89E633AB74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "506ACCE1-28D0-4983-89F2-DC969D6C5EC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E0AE74-DF57-4461-9A91-11F31459EC68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-32_mt\\/dss_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F233A3-B233-4112-93AA-6EA6638CBB77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-32_mt\\/dss:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16193E36-7987-45EB-AFBE-AFB360043E67",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "686B0F97-14C8-48A6-A25F-DF3BC6A0DA07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1644E1-F748-46A3-8E09-FF5D53FD046F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A00A164-30D7-45BF-8CB4-00F18569F488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8ACC832-E1EC-46DA-A2D1-CF1A3791A885",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-p502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0044A99C-4DAD-4593-B329-C3FFE706F8A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-p502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BA96DC-C462-4286-AE0E-32D141017E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fx5-cclgn-ms_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "671454B2-0474-479F-9F1E-EFCFAC01882E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fx5-cclgn-ms:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EE1B348-9F41-40EC-B1FC-D5919F332815",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:iu1-1m20-d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "714615F1-05A9-4D62-8671-F76CD1380C5A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:iu1-1m20-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "680B7B83-9F76-4C1F-B87A-F7049A0C46E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:le7-40gu-l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E4FD707-55B1-4A9C-9528-694C1008316B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:le7-40gu-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41477864-1A55-4547-936A-29D6504F0D3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:got2000_series_gt21_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16EAF851-CD95-4DD7-9BA0-FBBE90F7339E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:got2000_series_gt21:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0873DFF7-9627-482D-A4A9-72F8E26ACBB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:got_simple_series_gs21_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5BF7B0-75CE-481B-88E3-248D47CC19F2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:got_simple_series_gs21:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D30700D-F1DC-46B1-8785-7E24721264D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:got1000_series_gt14_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D68C2E9-3D0A-466B-9476-BE8110EC27E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:got1000_series_gt14:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BD1AB4-3A3D-46CD-B613-3E3613AAA273",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:gt25-j71gn13-t2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44078605-B592-48CC-9F91-F1B745212D78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:gt25-j71gn13-t2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCE2B83-0CBA-447A-8616-780301853AC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-a820-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70F1DC9-4930-4A99-BAC7-20F391693641",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-a820-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F6D4E4-CFC1-4CD4-92B9-738A062612D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-a840-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "689C466A-5CA6-4413-8BD6-CCFDBABC006A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-a840-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD00D598-4BEA-4E9B-9558-E80E22683C2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-a860-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC34BC7-C4E4-4D3B-BAD8-8A77F44AF205",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-a860-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75275274-2442-4372-B0DD-8AB50ABF08D0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-a842-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3F579C-C934-4589-90C2-FA1132104726",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-a842-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1615F6C9-3C1E-47F0-9B61-607DCBAE7B50",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-a862-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE896C56-DBD2-4050-9AB0-757F52FE0DBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-a862-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BBF6C1-F3DC-4E07-91A8-82D99BCE7E68",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-f820-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B923961-A068-4BE4-9C4C-D4F05A8E4A76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-f820-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD15A99-5F0A-49B7-82E4-59B1F8ADD94F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-f840-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B451C55F-DCCC-4C26-BB79-CDBFB9261B9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-f840-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB7232B-97CB-4820-A418-2CFEF95CED04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-f860-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2735CEBA-9D80-4068-80D4-C5E2B46EB20E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-f860-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDDBB50-1EAF-47E1-9DF0-9BA9433F3D47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-f842-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDBDB8D-4019-462E-9D5D-FE5BB57B2F13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-f842-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE513C7-3A83-4B34-A986-016F0AD5216C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-f862-e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFE7D90D-4E2D-4E62-83ED-CEEC9BC58378",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-f862-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "287546A0-141B-4A76-9B04-6914FF31B1A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-a8ncge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6DD95FF-BA97-45E9-86E5-A1ED73395759",
              "versionEndIncluding": "2020-08",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-a8ncge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99159924-7D0D-4E0D-A212-1B997A58B791",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-e800-epa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD834CCD-0D6A-4BA7-8CF1-CE3F358D80DD",
              "versionEndIncluding": "2020-07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-e800-epa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3D9C957-5A2F-46EC-B82C-6C0A36EB4A3F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:fr-e800-epb_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "753A00F4-4E1C-400D-969C-CB187DE76467",
              "versionEndIncluding": "2020-07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:fr-e800-epb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A448590A-35B3-4DB5-AEE6-5EBAE325920F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr12fh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6D0905-EEF6-4386-BE37-C138A722D04E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr20fh\\(n\\=1\\,2\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0AF6F96-A8F3-4F1C-8BF6-BFADE4ECC872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr3fh:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72D7D59-109B-4DD5-A59F-2D93D97FD69A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mitsubishielectric:conveyor_tracking_application_apr-ntr6fh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF939B93-2A02-4879-943E-29FB45173F1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:mr-je-c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "449AF664-6DF7-46D5-8508-CA59D7BD9661",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:mr-je-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C350628-57BA-4E37-A15D-0B19FBE423AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:mr-j4-tm_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C702434-90C9-47B2-B9EF-F9AFD847D8D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:mr-j4-tm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B10997-62CF-4512-ABB2-A679E77245AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples productos de Mitsubishi Electric, son vulnerables a suplantaciones de un dispositivo leg\u00edtimo por parte de un actor malicioso, lo que puede permitir a un atacante ejecutar comandos arbitrarios remotamente"
    }
  ],
  "id": "CVE-2020-16226",
  "lastModified": "2024-11-21T05:06:58.517",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-10-05T18:15:13.133",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-342"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Summary
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02D732B-25E3-4D8A-872B-EC655195DE44",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD1EB30-B1FC-49CC-97D7-739AA5E92E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-b5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "579FA375-1A72-4A5D-BC3E-285CBA5BD1A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-b5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6C571AE-9A2B-4673-90C1-A369B91E74FD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-b2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA33198-3964-490A-B4CE-388FC4C585FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-b2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB98436-7C3D-480C-927B-1D55DB1404B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock."
    },
    {
      "lang": "es",
      "value": "Ha sido descubierto un problema en las series Mitsubishi Electric Automation MELSEC-Q en m\u00f3dulos de interfaz Ethernet QJ71E71-100, todas las versiones, QJ71E71-B5, todas las versiones y QJ71E71-B2, todas las versiones. El m\u00f3dulo de interfaz Ethernet afectado est\u00e1 conectado a MELSEC-Q PLC, lo que puede permitir a un atacante remoto conectarse al PLC a trav\u00e9s de Port 5002/TCP y provocar una denegaci\u00f3n de servicio, requiriendo que el PLC sea reseteado para continuar operando. Esto se produce por un Unrestricted Externally Accessible Lock."
    }
  ],
  "id": "CVE-2016-8368",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-13T21:59:01.173",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94632"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94632"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-662"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-13 21:59
Modified
2025-04-20 01:37
Summary
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02D732B-25E3-4D8A-872B-EC655195DE44",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD1EB30-B1FC-49CC-97D7-739AA5E92E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-b5_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "579FA375-1A72-4A5D-BC3E-285CBA5BD1A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-b5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6C571AE-9A2B-4673-90C1-A369B91E74FD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-b2_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA33198-3964-490A-B4CE-388FC4C585FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-b2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCB98436-7C3D-480C-927B-1D55DB1404B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC."
    },
    {
      "lang": "es",
      "value": "Ha sido descubierto un problema en las series Mitsubishi Electric Automation MELSEC-Q en m\u00f3dulos de interfaz Ethernet QJ71E71-100, todas las versiones, QJ71E71-B5, todas las versiones y QJ71E71-B2, todas las versiones. Las contrase\u00f1as cifradas d\u00e9bilmente son transmitidas a un MELSEC-Q PLC."
    }
  ],
  "id": "CVE-2016-8370",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-13T21:59:01.220",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94632"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94632"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-23 14:29
Modified
2024-11-21 04:20
Summary
In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mitsubishielectric:qj71e71-100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18F5EB45-C37A-4E70-BF4C-ACFB59C99220",
              "versionEndIncluding": "20121",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:mitsubishielectric:qj71e71-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD1EB30-B1FC-49CC-97D7-739AA5E92E86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition."
    },
    {
      "lang": "es",
      "value": "En Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 y anteriores, un atacante podr\u00eda enviar paquetes TCP creados contra el servicio FTP, forzando a los dispositivos de destino a entrar en un modo de error y generar una condici\u00f3n de Denegaci\u00f3n de Servicio."
    }
  ],
  "id": "CVE-2019-10977",
  "lastModified": "2024-11-21T04:20:16.957",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-23T14:29:07.610",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108419"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-141-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/108419"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-141-02"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-755"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-201702-0075
Vulnerability from variot

An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock. Using incomplete or dangerous encryption algorithms (CWE-327) - CVE-2016-8370 The password included in the communication data is encrypted with a weak encryption algorithm. Inappropriate restrictions on external operations (CWE-412) - CVE-2016-8368 Port by remote third party 5002/TCP via PLC Resulting in service disruption (DoS) There is a possibility of being attacked.A password may be obtained by a remote party or service operation may be interrupted (DoS) There is a possibility of being attacked. Mitsubishi Electric is a Japanese company. An attacker exploiting a vulnerability can result in a denial of service condition. Attackers can exploit these issues to perform unauthorized actions or cause denial-of-service conditions

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0075",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "qj71e71-b5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "qj71e71-b2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "electric qj71e71-100",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "mitsubishi",
        "version": "0"
      },
      {
        "model": "electric qj71e71-b2",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "mitsubishi",
        "version": "0"
      },
      {
        "model": "electric qj71e71-b5",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "mitsubishi",
        "version": "0"
      },
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "of"
      },
      {
        "model": "qj71e71-b2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "of"
      },
      {
        "model": "qj71e71-b5",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "of"
      },
      {
        "model": "qj71e71-b2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mitsubishi electric",
        "version": null
      },
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mitsubishi electric",
        "version": null
      },
      {
        "model": "qj71e71-b5",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mitsubishi electric",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "qj71e71 100",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "qj71e71 b5",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "qj71e71 b2",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:mitsubishielectric:qj71e71-100_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:mitsubishielectric:qj71e71-b2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:mitsubishielectric:qj71e71-b5_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vladimir Dashchenko of Critical Infrastructure Defense Team",
    "sources": [
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-8368",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-8368",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 7.8,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-007661",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-11832",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-97188",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-8368",
            "impactScore": 4.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 8.6,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-007661",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-8368",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2016-007661",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-11832",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201612-009",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-97188",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97188"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock. Using incomplete or dangerous encryption algorithms (CWE-327) - CVE-2016-8370 The password included in the communication data is encrypted with a weak encryption algorithm. Inappropriate restrictions on external operations (CWE-412) - CVE-2016-8368 Port by remote third party 5002/TCP via PLC Resulting in service disruption (DoS) There is a possibility of being attacked.A password may be obtained by a remote party or service operation may be interrupted (DoS) There is a possibility of being attacked. Mitsubishi Electric is a Japanese company. An attacker exploiting a vulnerability can result in a denial of service condition. \nAttackers can exploit these issues to perform unauthorized  actions or cause  denial-of-service conditions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-8368"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97188"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-8368",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-336-03",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "94632",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU99901500",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "218C8DDF-AE70-4D34-AB2C-7271D1A5A80F",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-97188",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97188"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "id": "VAR-201702-0075",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97188"
      }
    ],
    "trust": 1.7055555333333334
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:07:39.610000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u4e09\u83f1\u96fb\u6a5f\u682a\u5f0f\u4f1a\u793e\u304b\u3089\u306e\u60c5\u5831",
        "trust": 0.8,
        "url": "http://jvn.jp/vu/JVNVU99901500/479518/index.html"
      },
      {
        "title": "Patches for multiple service violations in multiple Mitsubishi Electric MELSEC-Q series products",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/84928"
      },
      {
        "title": "Mitsubishi Electric MELSEC-Q Series Product Security Bypass Vulnerabilities and Remediation Measures for Denial of Service Vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65991"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-662",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.9
      },
      {
        "problemtype": "CWE-412",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-327",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-97188"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-03"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/94632"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8370"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8368"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu99901500/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8370"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8368"
      },
      {
        "trust": 0.3,
        "url": "http://www.mrslim.com/home.asp"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97188"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97188"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-05T00:00:00",
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "date": "2016-12-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97188"
      },
      {
        "date": "2016-12-01T00:00:00",
        "db": "BID",
        "id": "94632"
      },
      {
        "date": "2017-03-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "date": "2016-12-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      },
      {
        "date": "2017-02-13T21:59:01.173000",
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-11832"
      },
      {
        "date": "2017-03-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97188"
      },
      {
        "date": "2016-12-20T00:06:00",
        "db": "BID",
        "id": "94632"
      },
      {
        "date": "2017-04-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "date": "2021-09-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      },
      {
        "date": "2024-11-21T02:59:14.183000",
        "db": "NVD",
        "id": "CVE-2016-8368"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mitsubishi Electric  MELSEC-Q Series  Ethernet Multiple vulnerabilities in interface module",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "218c8ddf-ae70-4d34-ab2c-7271d1a5a80f"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201612-009"
      }
    ],
    "trust": 0.8
  }
}

var-201702-0077
Vulnerability from variot

An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC. Using incomplete or dangerous encryption algorithms (CWE-327) - CVE-2016-8370 The password included in the communication data is encrypted with a weak encryption algorithm. Inappropriate restrictions on external operations (CWE-412) - CVE-2016-8368 Port by remote third party 5002/TCP via PLC Resulting in service disruption (DoS) There is a possibility of being attacked.A password may be obtained by a remote party or service operation may be interrupted (DoS) There is a possibility of being attacked. Mitsubishi Electric is a Japanese company. An attacker exploits a vulnerability to perform an unauthorized operation

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0077",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "qj71e71-b5",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "qj71e71-b2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "electric qj71e71-100",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "mitsubishi",
        "version": "0"
      },
      {
        "model": "electric qj71e71-b2",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "mitsubishi",
        "version": "0"
      },
      {
        "model": "electric qj71e71-b5",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "mitsubishi",
        "version": "0"
      },
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "of"
      },
      {
        "model": "qj71e71-b2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "of"
      },
      {
        "model": "qj71e71-b5",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "of"
      },
      {
        "model": "qj71e71-b2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mitsubishi electric",
        "version": null
      },
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mitsubishi electric",
        "version": null
      },
      {
        "model": "qj71e71-b5",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mitsubishi electric",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "qj71e71 100",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "qj71e71 b5",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "qj71e71 b2",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:mitsubishielectric:qj71e71-100_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:mitsubishielectric:qj71e71-b2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:mitsubishielectric:qj71e71-b5_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vladimir Dashchenko of Critical Infrastructure Defense Team",
    "sources": [
      {
        "db": "BID",
        "id": "94632"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-8370",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-8370",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 7.8,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-007661",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2016-11833",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "e9b21e03-b557-44eb-b380-01d11c51c00c",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-97190",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-8370",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 8.6,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2016-007661",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-8370",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2016-007661",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-11833",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201702-463",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e9b21e03-b557-44eb-b380-01d11c51c00c",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-97190",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97190"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC. Using incomplete or dangerous encryption algorithms (CWE-327) - CVE-2016-8370 The password included in the communication data is encrypted with a weak encryption algorithm. Inappropriate restrictions on external operations (CWE-412) - CVE-2016-8368 Port by remote third party 5002/TCP via PLC Resulting in service disruption (DoS) There is a possibility of being attacked.A password may be obtained by a remote party or service operation may be interrupted (DoS) There is a possibility of being attacked. Mitsubishi Electric is a Japanese company. An attacker exploits a vulnerability to perform an unauthorized operation",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-8370"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97190"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-8370",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-16-336-03",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "94632",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU99901500",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "E9B21E03-B557-44EB-B380-01D11C51C00C",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-97190",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97190"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "id": "VAR-201702-0077",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97190"
      }
    ],
    "trust": 1.7055555333333334
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      },
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.2
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:07:39.650000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u4e09\u83f1\u96fb\u6a5f\u682a\u5f0f\u4f1a\u793e\u304b\u3089\u306e\u60c5\u5831",
        "trust": 0.8,
        "url": "http://jvn.jp/vu/JVNVU99901500/479518/index.html"
      },
      {
        "title": "Multiple Mitsubishi Electric MELSEC-Q series products have patches for security bypass vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/84929"
      },
      {
        "title": "Multiple Mitsubishi Electric Automation MELSEC-Q Repair measures for series product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67753"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-327",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-412",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-97190"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-16-336-03"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/94632"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8370"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8368"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu99901500/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8370"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8368"
      },
      {
        "trust": 0.3,
        "url": "http://www.mrslim.com/home.asp"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97190"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97190"
      },
      {
        "db": "BID",
        "id": "94632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-05T00:00:00",
        "db": "IVD",
        "id": "e9b21e03-b557-44eb-b380-01d11c51c00c"
      },
      {
        "date": "2016-12-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "date": "2017-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97190"
      },
      {
        "date": "2016-12-01T00:00:00",
        "db": "BID",
        "id": "94632"
      },
      {
        "date": "2017-03-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "date": "2017-02-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      },
      {
        "date": "2017-02-13T21:59:01.220000",
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-12-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-11833"
      },
      {
        "date": "2017-03-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97190"
      },
      {
        "date": "2016-12-20T00:06:00",
        "db": "BID",
        "id": "94632"
      },
      {
        "date": "2017-04-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      },
      {
        "date": "2021-05-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      },
      {
        "date": "2024-11-21T02:59:14.433000",
        "db": "NVD",
        "id": "CVE-2016-8370"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mitsubishi Electric  MELSEC-Q Series  Ethernet Multiple vulnerabilities in interface module",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-007661"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201702-463"
      }
    ],
    "trust": 0.6
  }
}

var-202010-0395
Vulnerability from variot

Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. of multiple Mitsubishi Electric products TCP A vulnerability in session management exists in the protocol stack. This vulnerability information is provided by the developer for the purpose of dissemination to product users. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Mitsubishi Electric gt14 model是日本三菱电机(Mitsubishi Electric)公司的一个用于工业生产过程中提供人机交互界面的设备. Mitsubishi Electric 多个产品存在命令执行漏洞,该漏洞允许攻击者冒充合法设备,从而使攻击者能够远程执行任意命令。以下产品和版本受到影响:QJ71MES96 all versions,QJ71WS96 all versions,Q06CCPU-V all versions,Q24DHCCPU-V all versions,Q24DHCCPU-VG all versions,R12CCPU-V Version 13 and prior,RD55UP06-V Version 09 and prior,RD55UP12-V Version 01,RJ71GN11-T2 Version 11 and prior,RJ71EN71 all versions,QJ71E71-100 all versions,LJ71E71-100 all versions,QJ71MT91 all versions,RD78Gn(n=4,8,16,32,64) all versions,RD78GHV all versions,RD78GHW all versions,NZ2GACP620-60 all versions,NZ2GACP620-300 all versions,NZ2FT-MT all versions,NZ2FT-EIP all versions,Q03UDECPU the first 5 digits of serial number 22081 and prior,QnUDEHCPU(n=04/06/10/13/20/26/50/100) the first 5 digits of serial number 22081 and prior,QnUDVCPU(n=03/04/06/13/26) the first 5 digits of serial number 22031 and prior,QnUDPVCPU(n=04/06/13/26) the first 5 digits of serial number 22031 and prior,LnCPU(-P)(n=02/06/26) the first 5 digits of serial number 22051 and prior,L26CPU-(P)BT the first 5 digits of serial number 22051 and prior,RnCPU(n=00/01/02) Version 18 and prior,RnCPU(n=04/08/16/32/120) Version 50 and prior,RnENCPU(n=04/08/16/32/120) Version 50 and prior,RnSFCPU (n=08/16/32/120) Version 22 and prior,RnPCPU(n=08/16/32/120) Version 24 and prior,RnPSFCPU(n=08/16/32/120) Version 05 and prior,FX5U(C)-M*/,FX5UC-32M/-TS Version 1.210 and prior,FX5UJ-M/ Version 1.000,FX5-ENET Version 1.002 and prior,FX5-ENET/IP Version 1.002 and prior,FX3U-ENET-ADP Version 1.22 and prior,FX3GE-M/* the first 3 digits of serial number 20X and prior,FX3U-ENET Version 1.14 and prior,FX3U-ENET-L Version 1.14 and prior,FX3U-ENET-P502 Version 1.14 and prior,FX5-CCLGN-MS Version 1.000,IU1-1M20-D all versions,LE7-40GU-L all versions,GOT2000 Series GT21 Model all versions,GS Series all versions,GOT1000 Series GT14 Model all versions,GT25-J71GN13-T2 all versions,FR-A800-E Series production date December 2020 and prior,FR-F800-E Series production date December 2020 and prior,FR-A8NCG Production date August 2020 and prior,FR-E800-EPA Series Production date July 2020 and prior,FR-E800-EPB Series Production date July 2020 and prior,Conveyor Tracking Application APR-nTR3FH APR-nTR6FH APR-nTR12FH APR-nTR20FH(n=1,2) all versions (Discontinued product),MR-JE-C all versions,MR-J4-TM all versions

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202010-0395",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fr-f842-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rnpsfcpu\\",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "qj71ws96",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-14mr\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-f860-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "q24dhccpu-v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uj-24mt\\/ess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "fx3u-enet",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "q24dhccpu-vg",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rnpcpu\\",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "got2000 series gt21",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-60mr\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5-enet-adp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-a860-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rd55up06-v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-40mr\\/ds",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-40mt\\/ess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uc-32mr\\/ds-ts",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.210"
      },
      {
        "model": "got1000 series gt14",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "conveyor tracking application apr-ntr12fh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "rd78ghv",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-f820-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-f840-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "qnudehcpu\\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "22081"
      },
      {
        "model": "qnudpvcpu\\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "22031"
      },
      {
        "model": "fx5uj-24mr\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "nz2gacp620-60",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rnsfcpu \\",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rj71en71",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5-enet",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-a862-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "mr-j4-tm",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "r12ccpu-v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "mr-je-c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-40mt\\/dss",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uj-40mt\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "fx3g-32 mt\\/dss",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "qnudvcpu\\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "22031"
      },
      {
        "model": "lj71e71-100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uj-40mt\\/ess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "fx5uc-32mt\\/d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.210"
      },
      {
        "model": "fx5uj-60mr\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "fx3g-14mr\\/ds",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-14mt\\/dss",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5-cclgn-ms",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-a8ncge",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "2020-08"
      },
      {
        "model": "qj71mt91",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-a820-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uj-60mt\\/ess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "fr-e800-epa",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "2020-07"
      },
      {
        "model": "got simple series gs21",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-e800-epb",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "2020-07"
      },
      {
        "model": "fx3g-14mt\\/ess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rj71gn11-t2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-40mr\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "le7-40gu-l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uj-40mr\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "iu1-1m20-d",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "nz2gacp620-300",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "l26cpu-\\ bt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "22051"
      },
      {
        "model": "nz2ft-mt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "q06ccpu-v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-f862-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "conveyor tracking application apr-ntr6fh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "fx3g-24mt\\/ess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rd78gn\\",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-24mr\\/ds",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "lncpu\\ \\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "22051"
      },
      {
        "model": "fx3g-60mr\\/ds",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "conveyor tracking application apr-ntr3fh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-24mr\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "conveyor tracking application apr-ntr20fh\\",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": null
      },
      {
        "model": "fx3u-enet-l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-a842-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fr-a840-e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-60mt\\/ess",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rd78ghw",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uc-32mt\\/dss",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.210"
      },
      {
        "model": "rncpu\\ t",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "18"
      },
      {
        "model": "fx3u-enet-p502",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "gt25-j71gn13-t2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uc-32mt\\/ds-ts",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.210"
      },
      {
        "model": "q03udecpu",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "22081"
      },
      {
        "model": "fx5uj-60mt\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "fx5uc-32mt\\/dss-ts",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.210"
      },
      {
        "model": "fx5-enet\\/ip",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx3g-60mt\\/dss",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rncpu\\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "50"
      },
      {
        "model": "fx3g-24mt\\/dss",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "rnencpu\\",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "50"
      },
      {
        "model": "qj71mes96",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "fx5uj-24mt\\/es",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "1.000"
      },
      {
        "model": "rd55up12-v",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "nz2ft-eip",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "*"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "(multiple products)"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * ac the servo  melservo"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * lossnay central ventilation system"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * display  got"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": null
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * air conditioning control system  / centralized controller"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * air conditioning control system  / expansion controller"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * energy measurement unit"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "affected products    s vary widely. for more information, please check the information provided by the developer."
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * range hood fan"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * data collection analyzer  melqic"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * hems compatible adapter, lan adapter"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * air conditioning control system  / bm adapter"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * room air conditioner"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * bath drying/heating/ventilation system"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * solar power system color monitor eco guide"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * ventilation fan for duct"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * tension controller"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * inverter  freqrol"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * mitsubishi energy saving dem  monitoring server  e-energy"
      },
      {
        "model": "\uff08\u8907\u6570\u306e\u88fd\u54c1\uff09",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u4e09\u83f1\u96fb\u6a5f",
        "version": "it was * robot  melfa"
      },
      {
        "model": "melsec iq-f",
        "scope": null,
        "trust": 0.7,
        "vendor": "mitsubishi electric",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ta-Lun Yen of TXOne IoT/ICS Security Research Labs (Trend Micro)",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2020-16226",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2020-16226",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.1,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-16226",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "Low",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2020-16226",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-16226",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-16226",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2020-16226",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2020-16226",
            "trust": 0.7,
            "value": "CRITICAL"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202009-074",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-16226",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. of multiple Mitsubishi Electric products TCP A vulnerability in session management exists in the protocol stack. This vulnerability information is provided by the developer for the purpose of dissemination to product users. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Mitsubishi Electric gt14 model\u662f\u65e5\u672c\u4e09\u83f1\u7535\u673a\uff08Mitsubishi Electric\uff09\u516c\u53f8\u7684\u4e00\u4e2a\u7528\u4e8e\u5de5\u4e1a\u751f\u4ea7\u8fc7\u7a0b\u4e2d\u63d0\u4f9b\u4eba\u673a\u4ea4\u4e92\u754c\u9762\u7684\u8bbe\u5907. \nMitsubishi Electric \u591a\u4e2a\u4ea7\u54c1\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u653b\u51fb\u8005\u5192\u5145\u5408\u6cd5\u8bbe\u5907\uff0c\u4ece\u800c\u4f7f\u653b\u51fb\u8005\u80fd\u591f\u8fdc\u7a0b\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u4ee5\u4e0b\u4ea7\u54c1\u548c\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aQJ71MES96 all versions\uff0cQJ71WS96 all versions\uff0cQ06CCPU-V all versions\uff0cQ24DHCCPU-V all versions\uff0cQ24DHCCPU-VG all versions\uff0cR12CCPU-V Version 13 and prior\uff0cRD55UP06-V Version 09 and prior\uff0cRD55UP12-V Version 01\uff0cRJ71GN11-T2 Version 11 and prior\uff0cRJ71EN71 all versions\uff0cQJ71E71-100 all versions\uff0cLJ71E71-100 all versions\uff0cQJ71MT91 all versions\uff0cRD78Gn(n=4,8,16,32,64) all versions\uff0cRD78GHV all versions\uff0cRD78GHW all versions\uff0cNZ2GACP620-60 all versions\uff0cNZ2GACP620-300 all versions\uff0cNZ2FT-MT all versions\uff0cNZ2FT-EIP all versions\uff0cQ03UDECPU the first 5 digits of serial number 22081 and prior\uff0cQnUDEHCPU(n=04/06/10/13/20/26/50/100) the first 5 digits of serial number 22081 and prior\uff0cQnUDVCPU(n=03/04/06/13/26) the first 5 digits of serial number 22031 and prior\uff0cQnUDPVCPU(n=04/06/13/26) the first 5 digits of serial number 22031 and prior\uff0cLnCPU(-P)(n=02/06/26) the first 5 digits of serial number 22051 and prior\uff0cL26CPU-(P)BT the first 5 digits of serial number 22051 and prior\uff0cRnCPU(n=00/01/02) Version 18 and prior\uff0cRnCPU(n=04/08/16/32/120) Version 50 and prior\uff0cRnENCPU(n=04/08/16/32/120) Version 50 and prior\uff0cRnSFCPU (n=08/16/32/120) Version 22 and prior\uff0cRnPCPU(n=08/16/32/120) Version 24 and prior\uff0cRnPSFCPU(n=08/16/32/120) Version 05 and prior\uff0cFX5U(C)-**M*/**\uff0cFX5UC-32M*/**-TS Version 1.210 and prior\uff0cFX5UJ-**M*/** Version 1.000\uff0cFX5-ENET Version 1.002 and prior\uff0cFX5-ENET/IP Version 1.002 and prior\uff0cFX3U-ENET-ADP Version 1.22 and prior\uff0cFX3GE-**M*/** the first 3 digits of serial number 20X and prior\uff0cFX3U-ENET Version 1.14 and prior\uff0cFX3U-ENET-L Version 1.14 and prior\uff0cFX3U-ENET-P502 Version 1.14 and prior\uff0cFX5-CCLGN-MS Version 1.000\uff0cIU1-1M20-D all versions\uff0cLE7-40GU-L all versions\uff0cGOT2000 Series GT21 Model all versions\uff0cGS Series all versions\uff0cGOT1000 Series GT14 Model all versions\uff0cGT25-J71GN13-T2 all versions\uff0cFR-A800-E Series production date December 2020 and prior\uff0cFR-F800-E Series production date December 2020 and prior\uff0cFR-A8NCG Production date August 2020 and prior\uff0cFR-E800-EPA Series Production date July 2020 and prior\uff0cFR-E800-EPB Series Production date July 2020 and prior\uff0cConveyor Tracking Application APR-nTR3FH APR-nTR6FH APR-nTR12FH APR-nTR20FH(n=1,2) all versions (Discontinued product)\uff0cMR-JE-C all versions\uff0cMR-J4-TM all versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-16226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16226"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-16226",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-20-245-01",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVNVU93926439",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-10966",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-1207",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.3041",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.4767",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16226",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "id": "VAR-202010-0395",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.41666666
  },
  "last_update_date": "2024-11-23T21:51:16.463000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "of our products TCP Spoofing Vulnerability in Protocol Stack",
        "trust": 0.8,
        "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-009.pdf"
      },
      {
        "title": "Mitsubishi Electric has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
      },
      {
        "title": "mitsubishielectric Fixes for remote command execution vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=127702"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-342",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of information (CWE-noinfo) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.8,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu93926439/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.3041/"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16226"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.4767"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/342.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-245-01"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-16226"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-09-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "date": "2020-10-05T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-16226"
      },
      {
        "date": "2020-09-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "date": "2020-09-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      },
      {
        "date": "2020-10-05T18:15:13.133000",
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-09-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-1207"
      },
      {
        "date": "2020-10-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-16226"
      },
      {
        "date": "2022-09-26T08:55:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      },
      {
        "date": "2022-09-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      },
      {
        "date": "2024-11-21T05:06:58.517000",
        "db": "NVD",
        "id": "CVE-2020-16226"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "of multiple Mitsubishi Electric products \u00a0TCP\u00a0 Session management flaw in protocol stack",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008251"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Command execution",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202009-074"
      }
    ],
    "trust": 0.6
  }
}

var-201905-1060
Vulnerability from variot

In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition. Provided by Mitsubishi Electric Corporation MELSEC-Q Series Ethernet Interface unit FTP Functions include service disruption (DoS) (CWE-400) Vulnerabilities exist. The Mitsubishi Electric MELSEC-QseriesEthernetmoduleQJ71E71-100 is an Ethernet module from Japan's Mitsubishi Electric. A remote denial of service vulnerability exists in MitsubishiElectricMELSEC-QSeriesPLCs that could allow an attacker to cause a denial of service. Mitsubishi Electric MELSEC-Q Series PLCs are prone to an remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. The following MELSEC-Q series PLCs are affected: QJ71E71-100 serial number 20121 and prior. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201905-1060",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "qj71e71-100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "mitsubishielectric",
        "version": "20121"
      },
      {
        "model": "qj71e71-100",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitsubishi electric",
        "version": "( above the serial number  5 digits  20121 previous version )"
      },
      {
        "model": "electric melsec-q series plcs j71e71-100 serial number",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "mitsubishi",
        "version": "\u003c=20121"
      },
      {
        "model": "electric qj71e71-100",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mitsubishi",
        "version": "20121"
      },
      {
        "model": "electric qj71e71-100",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mitsubishi",
        "version": "18072"
      },
      {
        "model": "electric qj71e71-100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "mitsubishi",
        "version": "20122"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "BID",
        "id": "108419"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:mitsubishielectric:qj71e71-100_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Younes Dragoni and Alessandro Di Pinto of Nozomi Networks,Younes Dragoni and Alessandro Di Pinto of Nozomi Networks reported this vulnerability to Mitsubishi and NCCIC.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2019-10977",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2019-10977",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-003963",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-16527",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-142577",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-10977",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-003963",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-10977",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2019-003963",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-16527",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201905-839",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-142577",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142577"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition. Provided by Mitsubishi Electric Corporation MELSEC-Q Series Ethernet Interface unit FTP Functions include service disruption (DoS) (CWE-400) Vulnerabilities exist. The Mitsubishi Electric MELSEC-QseriesEthernetmoduleQJ71E71-100 is an Ethernet module from Japan\u0027s Mitsubishi Electric. A remote denial of service vulnerability exists in MitsubishiElectricMELSEC-QSeriesPLCs that could allow an attacker to cause a denial of service. Mitsubishi Electric MELSEC-Q Series PLCs are prone to an remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThe following MELSEC-Q series PLCs are affected:\nQJ71E71-100 serial number 20121 and prior. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-10977"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "BID",
        "id": "108419"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142577"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-10977",
        "trust": 3.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-141-02",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "108419",
        "trust": 2.6
      },
      {
        "db": "JVN",
        "id": "JVNVU93268101",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.1867",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-142577",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142577"
      },
      {
        "db": "BID",
        "id": "108419"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "id": "VAR-201905-1060",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142577"
      }
    ],
    "trust": 1.575
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:37.107000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u304a\u554f\u3044\u5408\u308f\u305b | \u4e09\u83f1\u96fb\u6a5f FA",
        "trust": 0.8,
        "url": "https://www.mitsubishielectric.co.jp/fa/support/purchase/index.html"
      },
      {
        "title": "Patch for MitsubishiElectricMELSEC-QSeriesPLCs Remote Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/163035"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-400",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-755",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-142577"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://www.securityfocus.com/bid/108419"
      },
      {
        "trust": 2.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-141-02"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10977"
      },
      {
        "trust": 0.9,
        "url": "http://www.mitsubishi-automation.com/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10977"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu93268101/"
      },
      {
        "trust": 0.6,
        "url": "https://web.nvd.nist.gov//vuln/detail/cve-2019-10977"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.1867/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142577"
      },
      {
        "db": "BID",
        "id": "108419"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "db": "VULHUB",
        "id": "VHN-142577"
      },
      {
        "db": "BID",
        "id": "108419"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-06-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "date": "2019-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142577"
      },
      {
        "date": "2019-05-21T00:00:00",
        "db": "BID",
        "id": "108419"
      },
      {
        "date": "2019-05-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "date": "2019-05-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      },
      {
        "date": "2019-05-23T14:29:07.610000",
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-06-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-16527"
      },
      {
        "date": "2020-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-142577"
      },
      {
        "date": "2019-05-21T00:00:00",
        "db": "BID",
        "id": "108419"
      },
      {
        "date": "2019-05-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      },
      {
        "date": "2020-10-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      },
      {
        "date": "2024-11-21T04:20:16.957000",
        "db": "NVD",
        "id": "CVE-2019-10977"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Made by Mitsubishi Electric  MELSEC-Q series  Ethernet Service operation interruption in the interface unit (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003963"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-839"
      }
    ],
    "trust": 0.6
  }
}

CVE-2016-8368 (GCVE-0-2016-8368)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:20
Severity ?
CWE
  • Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Unrestricted Externally Accessible Lock
Summary
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock.
References
Impacted products
Vendor Product Version
n/a Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Version: Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:20:31.217Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
          },
          {
            "name": "94632",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94632"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module"
            }
          ]
        }
      ],
      "datePublic": "2017-02-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Unrestricted Externally Accessible Lock",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-14T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
        },
        {
          "name": "94632",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94632"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2016-8368",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Unrestricted Externally Accessible Lock"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
            },
            {
              "name": "94632",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94632"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2016-8368",
    "datePublished": "2017-02-13T21:00:00",
    "dateReserved": "2016-09-28T00:00:00",
    "dateUpdated": "2024-08-06T02:20:31.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-8370 (GCVE-0-2016-8370)
Vulnerability from cvelistv5
Published
2017-02-13 21:00
Modified
2024-08-06 02:20
Severity ?
CWE
  • Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module weak encryption
Summary
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC.
References
Impacted products
Vendor Product Version
n/a Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Version: Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:20:30.810Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
          },
          {
            "name": "94632",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94632"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module"
            }
          ]
        }
      ],
      "datePublic": "2017-02-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module weak encryption",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-02-14T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
        },
        {
          "name": "94632",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94632"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2016-8370",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module weak encryption"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-336-03"
            },
            {
              "name": "94632",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94632"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2016-8370",
    "datePublished": "2017-02-13T21:00:00",
    "dateReserved": "2016-09-28T00:00:00",
    "dateUpdated": "2024-08-06T02:20:30.810Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-10977 (GCVE-0-2019-10977)
Vulnerability from cvelistv5
Published
2019-05-23 13:28
Modified
2024-08-04 22:40
Severity ?
CWE
  • CWE-400 - UNCONTROLLED RESOURCE CONSUMPTION
Summary
In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition.
References
Impacted products
Vendor Product Version
Mitsubishi Electric MELSEC-Q series Ethernet module Version: QJ71E71-100 serial number 20121 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:40:15.601Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-141-02"
          },
          {
            "name": "108419",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108419"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MELSEC-Q series Ethernet module",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "QJ71E71-100 serial number 20121 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "UNCONTROLLED RESOURCE CONSUMPTION CWE-400",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-05-23T13:29:19",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-141-02"
        },
        {
          "name": "108419",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108419"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2019-10977",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MELSEC-Q series Ethernet module",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "QJ71E71-100 serial number 20121 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Mitsubishi Electric"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "UNCONTROLLED RESOURCE CONSUMPTION CWE-400"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-141-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-141-02"
            },
            {
              "name": "108419",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108419"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2019-10977",
    "datePublished": "2019-05-23T13:28:22",
    "dateReserved": "2019-04-08T00:00:00",
    "dateUpdated": "2024-08-04T22:40:15.601Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-16226 (GCVE-0-2020-16226)
Vulnerability from cvelistv5
Published
2020-10-05 17:19
Modified
2024-09-17 00:25
Severity ?
CWE
  • CWE-342 - PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
References
Impacted products
Vendor Product Version
Mitsubishi Electric QJ71MES96 Version: all versions
Create a notification for this product.
   Mitsubishi Electric QJ71WS96 Version: all versions
Create a notification for this product.
   Mitsubishi Electric Q06CCPU-V Version: all versions
Create a notification for this product.
   Mitsubishi Electric Q24DHCCPU-V Version: all versions
Create a notification for this product.
   Mitsubishi Electric Q24DHCCPU-VG Version: all versions
Create a notification for this product.
   Mitsubishi Electric R12CCPU-V Version: all versions
Create a notification for this product.
   Mitsubishi Electric RD55UP06-V, Version: all versions
Create a notification for this product.
   Mitsubishi Electric D55UP12-V Version: all versions
Create a notification for this product.
   Mitsubishi Electric RJ71GN11-T2 Version: all versions
Create a notification for this product.
   Mitsubishi Electric RJ71EN71 Version: all versions
Create a notification for this product.
   Mitsubishi Electric QJ71E71-100 Version: all versions
Create a notification for this product.
   Mitsubishi Electric LJ71E71-100 Version: all versions
Create a notification for this product.
   Mitsubishi Electric QJ71MT91 Version: all versions
Create a notification for this product.
   Mitsubishi Electric RD78Gn(n=4,8,16,32,64) Version: all versions
Create a notification for this product.
   Mitsubishi Electric RD78GHV Version: all versions
Create a notification for this product.
   Mitsubishi Electric RD78GHW Version: all versions
Create a notification for this product.
   Mitsubishi Electric NZ2GACP620-60 Version: all versions
Create a notification for this product.
   Mitsubishi Electric NZ2GACP620-300 Version: all versions
Create a notification for this product.
   Mitsubishi Electric NZ2FT-MT Version: all versions
Create a notification for this product.
   Mitsubishi Electric NZ2FT-EIP Version: all versions
Create a notification for this product.
   Mitsubishi Electric Q03UDECPU Version: the first 5 digits of serial number 22081 and prior
Create a notification for this product.
   Mitsubishi Electric QnUDEHCPU(n=04/06/10/13/20/26/50/100) Version: the first 5 digits of serial number 22081 and prior
Create a notification for this product.
   Mitsubishi Electric QnUDVCPU(n=03/04/06/13/26) Version: the first 5 digits of serial number 22031 and prior
Create a notification for this product.
   Mitsubishi Electric QnUDPVCPU(n=04/06/13/2) Version: the first 5 digits of serial number 22031 and prior
Create a notification for this product.
   Mitsubishi Electric LnCPU(-P)(n=02/06/26) Version: the first 5 digits of serial number 22051 and prior
Create a notification for this product.
   Mitsubishi Electric L26CPU-(P)BT Version: the first 5 digits of serial number 22051 and prior
Create a notification for this product.
   Mitsubishi Electric RnCPU(n=00/01/02) Version: unspecified   < Version 18 and prior
Create a notification for this product.
   Mitsubishi Electric RnCPU(n=04/08/16/32/120) Version: unspecified   < Version 50 and prior
Create a notification for this product.
   Mitsubishi Electric RnENCPU(n=04/08/16/32/120) Version: unspecified   < Version 50 and prior
Create a notification for this product.
   Mitsubishi Electric RnSFCPU (n=08/16/32/120) Version: all versions
Create a notification for this product.
   Mitsubishi Electric RnPCPU(n=08/16/32/120) Version: all versions
Create a notification for this product.
   Mitsubishi Electric RnPSFCPU(n=08/16/32/120) Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX5U(C)-**M*/** Version: unspecified   < Serial number 17X**** or later: Version 1.210 and prior
Version: unspecified   < Serial number 179**** and prior: Version 1.070 and prior
Create a notification for this product.
   Mitsubishi Electric FX5UC-32M*/**-TS Version: unspecified   < Version 1.210 and prior
Create a notification for this product.
   Mitsubishi Electric FX5UJ-**M*/** Version: Version 1.000
Create a notification for this product.
   Mitsubishi Electric FX5-ENET Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX5-ENET/IP Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX3U-ENET-ADP Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX3GE-**M*/** Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX3U-ENET Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX3U-ENET-L Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX3U-ENET-P502 Version: all versions
Create a notification for this product.
   Mitsubishi Electric FX5-CCLGN-MS Version: all versions
Create a notification for this product.
   Mitsubishi Electric IU1-1M20-D Version: all versions
Create a notification for this product.
   Mitsubishi Electric LE7-40GU-L Version: all versions
Create a notification for this product.
   Mitsubishi Electric GOT2000 Series GT21 Model Version: all versions
Create a notification for this product.
   Mitsubishi Electric GS Series Version: all versions
Create a notification for this product.
   Mitsubishi Electric GOT1000 Series GT14 Model Version: all versions
Create a notification for this product.
   Mitsubishi Electric GT25-J71GN13-T2 Version: all versions
Create a notification for this product.
   Mitsubishi Electric FR-A800-E Series Version: all versions
Create a notification for this product.
   Mitsubishi Electric FR-F800-E Series Version: all versions
Create a notification for this product.
   Mitsubishi Electric FR-A8NCG Version: Production date August 2020 and prior
Create a notification for this product.
   Mitsubishi Electric FR-E800-EPA Series Version: Production date July 2020 and prior
Create a notification for this product.
   Mitsubishi Electric FR-E800-EPB Series Version: Production date July 2020 and prior
Create a notification for this product.
   Mitsubishi Electric Conveyor Tracking Application Version: APR-nTR3FH all versions
Version: APR-nTR6FH all versions
Version: APR-nTR12FH all versions
Version: APR-nTR20FH(n=1,2) all versions
Create a notification for this product.
   Mitsubishi Electric MR-JE-C Version: all versions
Create a notification for this product.
   Mitsubishi Electric MR-J4-TM Version: all versions
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:37:54.189Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "QJ71MES96",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "QJ71WS96",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "Q06CCPU-V",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "Q24DHCCPU-V",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "Q24DHCCPU-VG",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "R12CCPU-V",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RD55UP06-V,",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "D55UP12-V",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RJ71GN11-T2",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RJ71EN71",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "QJ71E71-100",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "LJ71E71-100",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "QJ71MT91",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RD78Gn(n=4,8,16,32,64)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RD78GHV",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RD78GHW",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "NZ2GACP620-60",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "NZ2GACP620-300",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "NZ2FT-MT",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "NZ2FT-EIP",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "Q03UDECPU",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "the first 5 digits of serial number 22081 and prior"
            }
          ]
        },
        {
          "product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "the first 5 digits of serial number 22081 and prior"
            }
          ]
        },
        {
          "product": "QnUDVCPU(n=03/04/06/13/26)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "the first 5 digits of serial number 22031 and prior"
            }
          ]
        },
        {
          "product": "QnUDPVCPU(n=04/06/13/2)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "the first 5 digits of serial number 22031 and prior"
            }
          ]
        },
        {
          "product": "LnCPU(-P)(n=02/06/26)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "the first 5 digits of serial number 22051 and prior"
            }
          ]
        },
        {
          "product": "L26CPU-(P)BT",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "the first 5 digits of serial number 22051 and prior"
            }
          ]
        },
        {
          "product": "RnCPU(n=00/01/02)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "lessThan": "Version 18 and prior",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "RnCPU(n=04/08/16/32/120)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "lessThan": "Version 50 and prior",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "RnENCPU(n=04/08/16/32/120)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "lessThan": "Version 50 and prior",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "RnSFCPU (n=08/16/32/120)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RnPCPU(n=08/16/32/120)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "RnPSFCPU(n=08/16/32/120)",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX5U(C)-**M*/**",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "lessThan": "Serial number 17X**** or later: Version 1.210 and prior",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "Serial number 179**** and prior: Version 1.070 and prior",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "FX5UC-32M*/**-TS",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "lessThan": "Version 1.210 and prior",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "FX5UJ-**M*/**",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "Version 1.000"
            }
          ]
        },
        {
          "product": "FX5-ENET",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX5-ENET/IP",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX3U-ENET-ADP",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX3GE-**M*/**",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX3U-ENET",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX3U-ENET-L",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX3U-ENET-P502",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FX5-CCLGN-MS",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "IU1-1M20-D",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "LE7-40GU-L",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "GOT2000 Series GT21 Model",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "GS Series",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "GOT1000 Series GT14 Model",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "GT25-J71GN13-T2",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FR-A800-E Series",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FR-F800-E Series",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "FR-A8NCG",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "Production date August 2020 and prior"
            }
          ]
        },
        {
          "product": "FR-E800-EPA Series",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "Production date July 2020 and prior"
            }
          ]
        },
        {
          "product": "FR-E800-EPB Series",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "Production date July 2020 and prior"
            }
          ]
        },
        {
          "product": "Conveyor Tracking Application",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "APR-nTR3FH all versions"
            },
            {
              "status": "affected",
              "version": "APR-nTR6FH all versions"
            },
            {
              "status": "affected",
              "version": "APR-nTR12FH all versions"
            },
            {
              "status": "affected",
              "version": "APR-nTR20FH(n=1,2) all versions"
            }
          ]
        },
        {
          "product": "MR-JE-C",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "product": "MR-J4-TM",
          "vendor": "Mitsubishi Electric",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        }
      ],
      "datePublic": "2020-09-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-342",
              "description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-05T17:19:17",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
        }
      ],
      "source": {
        "advisory": "ICSA-20-245-01",
        "discovery": "UNKNOWN"
      },
      "title": "Mitsubishi Electric Multiple Products",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2020-09-01T16:00:00.000Z",
          "ID": "CVE-2020-16226",
          "STATE": "PUBLIC",
          "TITLE": "Mitsubishi Electric Multiple Products"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "QJ71MES96",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QJ71WS96",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Q06CCPU-V",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Q24DHCCPU-V",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Q24DHCCPU-VG",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "R12CCPU-V",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RD55UP06-V,",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "D55UP12-V",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RJ71GN11-T2",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RJ71EN71",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QJ71E71-100",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "LJ71E71-100",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QJ71MT91",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RD78Gn(n=4,8,16,32,64)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RD78GHV",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RD78GHW",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NZ2GACP620-60",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NZ2GACP620-300",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NZ2FT-MT",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "NZ2FT-EIP",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Q03UDECPU",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "the first 5 digits of serial number 22081 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "the first 5 digits of serial number 22081 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QnUDVCPU(n=03/04/06/13/26)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "the first 5 digits of serial number 22031 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "QnUDPVCPU(n=04/06/13/2)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "the first 5 digits of serial number 22031 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "LnCPU(-P)(n=02/06/26)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "the first 5 digits of serial number 22051 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "L26CPU-(P)BT",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "the first 5 digits of serial number 22051 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RnCPU(n=00/01/02)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "Version 18 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RnCPU(n=04/08/16/32/120)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "Version 50 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RnENCPU(n=04/08/16/32/120)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "Version 50 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RnSFCPU (n=08/16/32/120)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RnPCPU(n=08/16/32/120)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "RnPSFCPU(n=08/16/32/120)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX5U(C)-**M*/**",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "Serial number 17X**** or later: Version 1.210 and prior"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "Serial number 179**** and prior: Version 1.070 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX5UC-32M*/**-TS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "Version 1.210 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX5UJ-**M*/**",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "Version 1.000"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX5-ENET",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX5-ENET/IP",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX3U-ENET-ADP",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX3GE-**M*/**",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX3U-ENET",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX3U-ENET-L",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX3U-ENET-P502",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FX5-CCLGN-MS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "IU1-1M20-D",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "LE7-40GU-L",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GOT2000 Series GT21 Model",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GS Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GOT1000 Series GT14 Model",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "GT25-J71GN13-T2",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FR-A800-E Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FR-F800-E Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FR-A8NCG",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "Production date August 2020 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FR-E800-EPA Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "Production date July 2020 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "FR-E800-EPB Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "Production date July 2020 and prior"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Conveyor Tracking Application",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "APR-nTR3FH",
                            "version_value": "all versions"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "APR-nTR6FH",
                            "version_value": "all versions"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "APR-nTR12FH",
                            "version_value": "all versions"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "APR-nTR20FH(n=1,2)",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "MR-JE-C",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "MR-J4-TM",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "all versions"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Mitsubishi Electric"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01"
            }
          ]
        },
        "source": {
          "advisory": "ICSA-20-245-01",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-16226",
    "datePublished": "2020-10-05T17:19:17.358565Z",
    "dateReserved": "2020-07-31T00:00:00",
    "dateUpdated": "2024-09-17T00:25:38.551Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}