CVE-2021-20593 (GCVE-0-2021-20593)

Vulnerability from cvelistv5 – Published: 2021-07-13 13:30 – Updated: 2024-08-03 17:45
VLAI?
Summary
Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability.
Severity ?
No CVSS data available.
CWE
  • Incorrect Implementation of Authentication Algorithm
Assigner
Impacted products
Vendor Product Version
n/a Air Conditioning System/Centralized Controllers G-50A; GB-50A; AG-150A-A; AG-150A-J; GB-50ADA-A; GB-50ADA-J; EB-50GU-A; EB-50GU-J; AE-200A; AE-200E; AE-50A; AE-50E; EW-50A; EW-50E; TE-200A; TE-50A; TW-50A; CMS-RMD-J; Air Conditioning System/Expansion Controllers PAC-YG50ECA Affected: Ver.2.50 to Ver.3.35
Affected: Ver.3.20 and prior
Affected: Ver 7.09 and prior
Affected: Ver 7.93 and prior
Affected: Ver.1.30 and prior
Affected: Ver.2.20 and prior
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:45:44.715Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/vu/JVNVU96046575/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Air Conditioning System/Centralized Controllers G-50A; GB-50A; AG-150A-A; AG-150A-J; GB-50ADA-A; GB-50ADA-J; EB-50GU-A; EB-50GU-J; AE-200A; AE-200E; AE-50A; AE-50E; EW-50A; EW-50E; TE-200A; TE-50A; TW-50A; CMS-RMD-J; Air Conditioning System/Expansion Controllers PAC-YG50ECA",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.50 to Ver.3.35"
            },
            {
              "status": "affected",
              "version": "Ver.3.20 and prior"
            },
            {
              "status": "affected",
              "version": "Ver 7.09 and prior"
            },
            {
              "status": "affected",
              "version": "Ver 7.93 and prior"
            },
            {
              "status": "affected",
              "version": "Ver.1.30 and prior"
            },
            {
              "status": "affected",
              "version": "Ver.2.20 and prior"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Incorrect Implementation of Authentication Algorithm",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-13T13:30:59",
        "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad",
        "shortName": "Mitsubishi"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/vu/JVNVU96046575/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
          "ID": "CVE-2021-20593",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Air Conditioning System/Centralized Controllers G-50A; GB-50A; AG-150A-A; AG-150A-J; GB-50ADA-A; GB-50ADA-J; EB-50GU-A; EB-50GU-J; AE-200A; AE-200E; AE-50A; AE-50E; EW-50A; EW-50E; TE-200A; TE-50A; TW-50A; CMS-RMD-J; Air Conditioning System/Expansion Controllers PAC-YG50ECA",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Ver.2.50 to Ver.3.35"
                          },
                          {
                            "version_value": "Ver.2.50 to Ver.3.35"
                          },
                          {
                            "version_value": "Ver.3.20 and prior"
                          },
                          {
                            "version_value": "Ver.3.20 and prior"
                          },
                          {
                            "version_value": "Ver.3.20 and prior"
                          },
                          {
                            "version_value": "Ver.3.20 and prior"
                          },
                          {
                            "version_value": "Ver 7.09 and prior"
                          },
                          {
                            "version_value": "Ver 7.09 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver 7.93 and prior"
                          },
                          {
                            "version_value": "Ver.1.30 and prior"
                          },
                          {
                            "version_value": "Ver.2.20 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Incorrect Implementation of Authentication Algorithm"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf",
              "refsource": "MISC",
              "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf"
            },
            {
              "name": "https://jvn.jp/vu/JVNVU96046575/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/vu/JVNVU96046575/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad",
    "assignerShortName": "Mitsubishi",
    "cveId": "CVE-2021-20593",
    "datePublished": "2021-07-13T13:30:59",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-08-03T17:45:44.715Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:g-50a_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.50\", \"versionEndIncluding\": \"3.35\", \"matchCriteriaId\": \"590E5BE8-3A41-4AAE-831E-8D01C2E4296F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:g-50a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD839297-7BB1-4447-B781-86A501682648\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:gb-50a_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.50\", \"versionEndIncluding\": \"3.35\", \"matchCriteriaId\": \"C24DC7AC-ACF3-4B4F-8605-60ABBC91F723\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:gb-50a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF1DA319-3B4E-4255-8B09-D4CA82F4CEDD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ag-150a-a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.20\", \"matchCriteriaId\": \"A59BEA50-00EF-4958-97D3-D13599FDB02E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ag-150a-a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E37278D-F466-4D02-A3D2-C784D579156B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ag-150a-j_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.20\", \"matchCriteriaId\": \"66F1FEF1-1896-4ABD-A69B-789AF83B5D17\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ag-150a-j:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A95212E0-241E-4AD9-97A4-1F75DF382115\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:gb-50ada-a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.20\", \"matchCriteriaId\": \"2714AD39-85DB-4A82-91F4-AF1E1AD7732B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:gb-50ada-a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F3A0876-AAC8-48B2-9081-F0989CBCF3C0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:gb-50ada-j_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.20\", \"matchCriteriaId\": \"2175EE52-FE97-490D-A52F-2775C84E2577\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:gb-50ada-j:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"006B9E46-F48B-483B-A909-35A7E5A5A76B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:eb-50gu-a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.09\", \"matchCriteriaId\": \"0750A08B-856A-456E-926F-1EBDB90A6608\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:eb-50gu-a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BC98F5E-1FE9-4C5D-80B5-E90852A9BE0C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:eb-50gu-j_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.09\", \"matchCriteriaId\": \"84227253-E377-41F7-B515-C890F28F271B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:eb-50gu-j:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4575CA5F-5B1F-46AF-BD08-7A6C37E7D2F9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ae-200a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"70AC9C1D-4AE3-430F-98F0-6A4944725B58\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ae-200a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"208B2720-7090-41FB-99EF-20D4BBF07685\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ae-200e_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"125ED867-F47D-4532-98F5-FDC99819D37C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ae-200e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"222E1D60-FB10-477A-A21E-EAC902CCC1EF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ae-50a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"8AEC0B91-9928-404E-9991-6FE8560E4A94\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ae-50a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BC7EF0E-9DC4-4126-BA84-990FDE5EC5EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ae-50e_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"A13BC506-5437-4FB5-9FA6-666B9785D774\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ae-50e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E2F0B95-8905-4CBD-A50D-DD11C3B1639E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ew-50a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"7BA4C2EB-96FD-416E-BB0F-6390516904E5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ew-50a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A55E519-0E2B-4809-9453-3D240949AF25\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:ew-50e_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"BA6DCE61-57D2-4011-AF5B-6A5A8D180491\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:ew-50e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36D3BD0B-F2C0-4DD7-9EC7-A0ADD2001833\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:te-200a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"2454711C-B053-4071-996A-CF2F90FCC27D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:te-200a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15CCCC0A-AFBE-4C9B-A92C-8E0C5CF2A055\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:te-50a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"E5CD0C0A-7EFE-4435-A6DE-A0AEF6F1CA09\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:te-50a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C556A4B8-4351-43AD-9E85-D8736D3799E7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:tw-50a_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.93\", \"matchCriteriaId\": \"D9B2E089-A079-448D-A0AB-B92828747504\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:tw-50a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2625668C-2AB6-4610-A609-D2B299EA9B53\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:cms-rmd-j_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.30\", \"matchCriteriaId\": \"E55ABCF2-4170-40F6-8D75-C6EFA7EA4802\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:cms-rmd-j:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F93ABCC-1DD4-4202-831C-AD1E5D04FD31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mitsubishi:pac-yg50eca_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"89CEB979-0C82-41BB-9371-F860EE9C635E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mitsubishi:pac-yg50eca:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32415898-51D3-4925-8AD1-84D9A3276181\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Una Implementaci\\u00f3n Incorrecta del Algoritmo de Autenticaci\\u00f3n en Mitsubishi Electric Air Conditioning System/Centralized Controllers versiones:  (G-50A Versiones.2.50 hasta Versiones. 3.35, GB-50A Versiones.2.50 hasta Versiones. 3.35, AG-150A-A Ver.3.20 y anteriores, AG-150A-J Ver.3.20 y anteriores, GB-50ADA-A Versiones.3.20 y anteriores, GB-50ADA-J Versiones.3 .20 y anteriores, EB-50GU-A Versiones 7.09 y anteriores, EB-50GU-J Versiones 7.09 y anteriores, AE-200A Versiones 7.93 y anteriores, AE-200E Versiones 7.93 y anteriores, AE-50A Versiones 7.93 y anteriores, AE-50E Versiones 7.93 y anteriores, EW-50A Versiones 7.93 y anteriores, EW-50E Versiones 7.93 y anteriores, TE-200A Versiones 7.93 y anteriores, TE-50A Versiones 7.93 y anteriores, TW-50A Versiones 7.93 y anteriores, CMS-RMD-J Versiones.1 .30 y anteriores) y los Controladores del Air Conditioning System/Expansion (PAC-YG50ECA Versiones .2.20 y anteriores) permiten a un atacante remoto autenticado hacerse pasar por administrador para divulgar informaci\\u00f3n de configuraci\\u00f3n del sistema de aire acondicionado e informaci\\u00f3n de manipulaci\\u00f3n (por ejemplo, informaci\\u00f3n de funcionamiento y configuraci\\u00f3n del sistema de aire acondicionado) al explotar esta vulnerabilidad\"}]",
      "id": "CVE-2021-20593",
      "lastModified": "2024-11-21T05:46:50.477",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:N\", \"baseScore\": 5.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-07-13T14:15:08.410",
      "references": "[{\"url\": \"https://jvn.jp/vu/JVNVU96046575/index.html\", \"source\": \"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf\", \"source\": \"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/vu/JVNVU96046575/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-20593\",\"sourceIdentifier\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"published\":\"2021-07-13T14:15:08.410\",\"lastModified\":\"2024-11-21T05:46:50.477\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una Implementaci\u00f3n Incorrecta del Algoritmo de Autenticaci\u00f3n en Mitsubishi Electric Air Conditioning System/Centralized Controllers versiones:  (G-50A Versiones.2.50 hasta Versiones. 3.35, GB-50A Versiones.2.50 hasta Versiones. 3.35, AG-150A-A Ver.3.20 y anteriores, AG-150A-J Ver.3.20 y anteriores, GB-50ADA-A Versiones.3.20 y anteriores, GB-50ADA-J Versiones.3 .20 y anteriores, EB-50GU-A Versiones 7.09 y anteriores, EB-50GU-J Versiones 7.09 y anteriores, AE-200A Versiones 7.93 y anteriores, AE-200E Versiones 7.93 y anteriores, AE-50A Versiones 7.93 y anteriores, AE-50E Versiones 7.93 y anteriores, EW-50A Versiones 7.93 y anteriores, EW-50E Versiones 7.93 y anteriores, TE-200A Versiones 7.93 y anteriores, TE-50A Versiones 7.93 y anteriores, TW-50A Versiones 7.93 y anteriores, CMS-RMD-J Versiones.1 .30 y anteriores) y los Controladores del Air Conditioning System/Expansion (PAC-YG50ECA Versiones .2.20 y anteriores) permiten a un atacante remoto autenticado hacerse pasar por administrador para divulgar informaci\u00f3n de configuraci\u00f3n del sistema de aire acondicionado e informaci\u00f3n de manipulaci\u00f3n (por ejemplo, informaci\u00f3n de funcionamiento y configuraci\u00f3n del sistema de aire acondicionado) al explotar esta vulnerabilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:N\",\"baseScore\":5.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:g-50a_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.50\",\"versionEndIncluding\":\"3.35\",\"matchCriteriaId\":\"590E5BE8-3A41-4AAE-831E-8D01C2E4296F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:g-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD839297-7BB1-4447-B781-86A501682648\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:gb-50a_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.50\",\"versionEndIncluding\":\"3.35\",\"matchCriteriaId\":\"C24DC7AC-ACF3-4B4F-8605-60ABBC91F723\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:gb-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF1DA319-3B4E-4255-8B09-D4CA82F4CEDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ag-150a-a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"A59BEA50-00EF-4958-97D3-D13599FDB02E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ag-150a-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E37278D-F466-4D02-A3D2-C784D579156B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ag-150a-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"66F1FEF1-1896-4ABD-A69B-789AF83B5D17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ag-150a-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95212E0-241E-4AD9-97A4-1F75DF382115\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:gb-50ada-a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"2714AD39-85DB-4A82-91F4-AF1E1AD7732B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:gb-50ada-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F3A0876-AAC8-48B2-9081-F0989CBCF3C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:gb-50ada-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"2175EE52-FE97-490D-A52F-2775C84E2577\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:gb-50ada-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"006B9E46-F48B-483B-A909-35A7E5A5A76B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:eb-50gu-a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.09\",\"matchCriteriaId\":\"0750A08B-856A-456E-926F-1EBDB90A6608\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:eb-50gu-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC98F5E-1FE9-4C5D-80B5-E90852A9BE0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:eb-50gu-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.09\",\"matchCriteriaId\":\"84227253-E377-41F7-B515-C890F28F271B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:eb-50gu-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4575CA5F-5B1F-46AF-BD08-7A6C37E7D2F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-200a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"70AC9C1D-4AE3-430F-98F0-6A4944725B58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-200a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208B2720-7090-41FB-99EF-20D4BBF07685\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-200e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"125ED867-F47D-4532-98F5-FDC99819D37C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-200e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"222E1D60-FB10-477A-A21E-EAC902CCC1EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"8AEC0B91-9928-404E-9991-6FE8560E4A94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC7EF0E-9DC4-4126-BA84-990FDE5EC5EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-50e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"A13BC506-5437-4FB5-9FA6-666B9785D774\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-50e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E2F0B95-8905-4CBD-A50D-DD11C3B1639E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ew-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"7BA4C2EB-96FD-416E-BB0F-6390516904E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ew-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A55E519-0E2B-4809-9453-3D240949AF25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ew-50e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"BA6DCE61-57D2-4011-AF5B-6A5A8D180491\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ew-50e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D3BD0B-F2C0-4DD7-9EC7-A0ADD2001833\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:te-200a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"2454711C-B053-4071-996A-CF2F90FCC27D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:te-200a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15CCCC0A-AFBE-4C9B-A92C-8E0C5CF2A055\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:te-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"E5CD0C0A-7EFE-4435-A6DE-A0AEF6F1CA09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:te-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C556A4B8-4351-43AD-9E85-D8736D3799E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:tw-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"D9B2E089-A079-448D-A0AB-B92828747504\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:tw-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2625668C-2AB6-4610-A609-D2B299EA9B53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:cms-rmd-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.30\",\"matchCriteriaId\":\"E55ABCF2-4170-40F6-8D75-C6EFA7EA4802\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:cms-rmd-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F93ABCC-1DD4-4202-831C-AD1E5D04FD31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:pac-yg50eca_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"89CEB979-0C82-41BB-9371-F860EE9C635E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:pac-yg50eca:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32415898-51D3-4925-8AD1-84D9A3276181\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/vu/JVNVU96046575/index.html\",\"source\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf\",\"source\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/vu/JVNVU96046575/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…