CVE-2021-20593 (GCVE-0-2021-20593)
Vulnerability from cvelistv5
Published
2021-07-13 13:30
Modified
2024-08-03 17:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Incorrect Implementation of Authentication Algorithm
Summary
Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Air Conditioning System/Centralized Controllers G-50A; GB-50A; AG-150A-A; AG-150A-J; GB-50ADA-A; GB-50ADA-J; EB-50GU-A; EB-50GU-J; AE-200A; AE-200E; AE-50A; AE-50E; EW-50A; EW-50E; TE-200A; TE-50A; TW-50A; CMS-RMD-J; Air Conditioning System/Expansion Controllers PAC-YG50ECA |
Version: Ver.2.50 to Ver.3.35 Version: Ver.3.20 and prior Version: Ver 7.09 and prior Version: Ver 7.93 and prior Version: Ver.1.30 and prior Version: Ver.2.20 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:45:44.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96046575/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Air Conditioning System/Centralized Controllers G-50A; GB-50A; AG-150A-A; AG-150A-J; GB-50ADA-A; GB-50ADA-J; EB-50GU-A; EB-50GU-J; AE-200A; AE-200E; AE-50A; AE-50E; EW-50A; EW-50E; TE-200A; TE-50A; TW-50A; CMS-RMD-J; Air Conditioning System/Expansion Controllers PAC-YG50ECA", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Ver.2.50 to Ver.3.35" }, { "status": "affected", "version": "Ver.3.20 and prior" }, { "status": "affected", "version": "Ver 7.09 and prior" }, { "status": "affected", "version": "Ver 7.93 and prior" }, { "status": "affected", "version": "Ver.1.30 and prior" }, { "status": "affected", "version": "Ver.2.20 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Implementation of Authentication Algorithm", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T13:30:59", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96046575/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2021-20593", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Air Conditioning System/Centralized Controllers G-50A; GB-50A; AG-150A-A; AG-150A-J; GB-50ADA-A; GB-50ADA-J; EB-50GU-A; EB-50GU-J; AE-200A; AE-200E; AE-50A; AE-50E; EW-50A; EW-50E; TE-200A; TE-50A; TW-50A; CMS-RMD-J; Air Conditioning System/Expansion Controllers PAC-YG50ECA", "version": { "version_data": [ { "version_value": "Ver.2.50 to Ver.3.35" }, { "version_value": "Ver.2.50 to Ver.3.35" }, { "version_value": "Ver.3.20 and prior" }, { "version_value": "Ver.3.20 and prior" }, { "version_value": "Ver.3.20 and prior" }, { "version_value": "Ver.3.20 and prior" }, { "version_value": "Ver 7.09 and prior" }, { "version_value": "Ver 7.09 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver 7.93 and prior" }, { "version_value": "Ver.1.30 and prior" }, { "version_value": "Ver.2.20 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Implementation of Authentication Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96046575/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96046575/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2021-20593", "datePublished": "2021-07-13T13:30:59", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:45:44.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-20593\",\"sourceIdentifier\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"published\":\"2021-07-13T14:15:08.410\",\"lastModified\":\"2024-11-21T05:46:50.477\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una Implementaci\u00f3n Incorrecta del Algoritmo de Autenticaci\u00f3n en Mitsubishi Electric Air Conditioning System/Centralized Controllers versiones: (G-50A Versiones.2.50 hasta Versiones. 3.35, GB-50A Versiones.2.50 hasta Versiones. 3.35, AG-150A-A Ver.3.20 y anteriores, AG-150A-J Ver.3.20 y anteriores, GB-50ADA-A Versiones.3.20 y anteriores, GB-50ADA-J Versiones.3 .20 y anteriores, EB-50GU-A Versiones 7.09 y anteriores, EB-50GU-J Versiones 7.09 y anteriores, AE-200A Versiones 7.93 y anteriores, AE-200E Versiones 7.93 y anteriores, AE-50A Versiones 7.93 y anteriores, AE-50E Versiones 7.93 y anteriores, EW-50A Versiones 7.93 y anteriores, EW-50E Versiones 7.93 y anteriores, TE-200A Versiones 7.93 y anteriores, TE-50A Versiones 7.93 y anteriores, TW-50A Versiones 7.93 y anteriores, CMS-RMD-J Versiones.1 .30 y anteriores) y los Controladores del Air Conditioning System/Expansion (PAC-YG50ECA Versiones .2.20 y anteriores) permiten a un atacante remoto autenticado hacerse pasar por administrador para divulgar informaci\u00f3n de configuraci\u00f3n del sistema de aire acondicionado e informaci\u00f3n de manipulaci\u00f3n (por ejemplo, informaci\u00f3n de funcionamiento y configuraci\u00f3n del sistema de aire acondicionado) al explotar esta vulnerabilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:N\",\"baseScore\":5.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:g-50a_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.50\",\"versionEndIncluding\":\"3.35\",\"matchCriteriaId\":\"590E5BE8-3A41-4AAE-831E-8D01C2E4296F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:g-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD839297-7BB1-4447-B781-86A501682648\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:gb-50a_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.50\",\"versionEndIncluding\":\"3.35\",\"matchCriteriaId\":\"C24DC7AC-ACF3-4B4F-8605-60ABBC91F723\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:gb-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF1DA319-3B4E-4255-8B09-D4CA82F4CEDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ag-150a-a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"A59BEA50-00EF-4958-97D3-D13599FDB02E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ag-150a-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E37278D-F466-4D02-A3D2-C784D579156B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ag-150a-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"66F1FEF1-1896-4ABD-A69B-789AF83B5D17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ag-150a-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95212E0-241E-4AD9-97A4-1F75DF382115\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:gb-50ada-a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"2714AD39-85DB-4A82-91F4-AF1E1AD7732B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:gb-50ada-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F3A0876-AAC8-48B2-9081-F0989CBCF3C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:gb-50ada-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20\",\"matchCriteriaId\":\"2175EE52-FE97-490D-A52F-2775C84E2577\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:gb-50ada-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"006B9E46-F48B-483B-A909-35A7E5A5A76B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:eb-50gu-a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.09\",\"matchCriteriaId\":\"0750A08B-856A-456E-926F-1EBDB90A6608\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:eb-50gu-a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC98F5E-1FE9-4C5D-80B5-E90852A9BE0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:eb-50gu-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.09\",\"matchCriteriaId\":\"84227253-E377-41F7-B515-C890F28F271B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:eb-50gu-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4575CA5F-5B1F-46AF-BD08-7A6C37E7D2F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-200a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"70AC9C1D-4AE3-430F-98F0-6A4944725B58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-200a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208B2720-7090-41FB-99EF-20D4BBF07685\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-200e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"125ED867-F47D-4532-98F5-FDC99819D37C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-200e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"222E1D60-FB10-477A-A21E-EAC902CCC1EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"8AEC0B91-9928-404E-9991-6FE8560E4A94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC7EF0E-9DC4-4126-BA84-990FDE5EC5EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ae-50e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"A13BC506-5437-4FB5-9FA6-666B9785D774\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ae-50e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E2F0B95-8905-4CBD-A50D-DD11C3B1639E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ew-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"7BA4C2EB-96FD-416E-BB0F-6390516904E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ew-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A55E519-0E2B-4809-9453-3D240949AF25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:ew-50e_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"BA6DCE61-57D2-4011-AF5B-6A5A8D180491\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:ew-50e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D3BD0B-F2C0-4DD7-9EC7-A0ADD2001833\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:te-200a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"2454711C-B053-4071-996A-CF2F90FCC27D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:te-200a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15CCCC0A-AFBE-4C9B-A92C-8E0C5CF2A055\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:te-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"E5CD0C0A-7EFE-4435-A6DE-A0AEF6F1CA09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:te-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C556A4B8-4351-43AD-9E85-D8736D3799E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:tw-50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.93\",\"matchCriteriaId\":\"D9B2E089-A079-448D-A0AB-B92828747504\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:tw-50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2625668C-2AB6-4610-A609-D2B299EA9B53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:cms-rmd-j_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.30\",\"matchCriteriaId\":\"E55ABCF2-4170-40F6-8D75-C6EFA7EA4802\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:cms-rmd-j:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F93ABCC-1DD4-4202-831C-AD1E5D04FD31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mitsubishi:pac-yg50eca_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"89CEB979-0C82-41BB-9371-F860EE9C635E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mitsubishi:pac-yg50eca:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32415898-51D3-4925-8AD1-84D9A3276181\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/vu/JVNVU96046575/index.html\",\"source\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf\",\"source\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/vu/JVNVU96046575/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-004_en.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…