var-202006-1511
Vulnerability from variot
Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules all versions contain a vulnerability that allows cleartext transmission of sensitive information between CPU modules and GX Works3 and/or GX Works2 via unspecified vectors. Mitsubishi Electric MELSEC iQ-R series, etc. are all a programmable logic controller of Japan's Mitsubishi Electric (Mitsubishi Electric) company.
There are security vulnerabilities in many Mitsubishi Electric products. The vulnerabilities stem from the use of clear text communication between the CPU module and GX Works3 or GX Works2. Attackers can use the vulnerabilities to eavesdrop or tamper with communication data, perform unauthorized operations, and cause denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1511", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "melsec-q", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "melsec-l", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "melsec iq-f", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "melsec-fx", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "melsec iq-r", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "*" }, { "model": "melsec fx series", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "\u306e cpu \u30e6\u30cb\u30c3\u30c8 \u5168\u3066" }, { "model": "melsec iq-f series", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "\u306e cpu \u30e6\u30cb\u30c3\u30c8 \u5168\u3066" }, { "model": "melsec iq-r series", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "\u306e cpu \u30e6\u30cb\u30c3\u30c8 \u5168\u3066" }, { "model": "melsec l series", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "\u306e cpu \u30e6\u30cb\u30c3\u30c8 \u5168\u3066" }, { "model": "melsec q series", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "\u306e cpu \u30e6\u30cb\u30c3\u30c8 \u5168\u3066" }, { "model": "electric melsec fx", "scope": null, "trust": 0.6, "vendor": "mitsubishi", "version": null }, { "model": "electric melsec iq-r", "scope": null, "trust": 0.6, "vendor": "mitsubishi", "version": null }, { "model": "electric melsec iq-f", "scope": null, "trust": 0.6, "vendor": "mitsubishi", "version": null }, { "model": "electric melsec q", "scope": null, "trust": 0.6, "vendor": "mitsubishi", "version": null }, { "model": "electric melsec l", "scope": null, "trust": 0.6, "vendor": "mitsubishi", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-46802" }, { "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "db": "NVD", "id": "CVE-2020-5594" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:mitsubishielectric:melsec_fx_series", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mitsubishielectric:melsec_iq-f_series", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mitsubishielectric:melsec_iq-r_series", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mitsubishielectric:melsec_l_series", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mitsubishielectric:melsec_q_series", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005854" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Shunkai Zhu , Rongkuan Ma , Peng Cheng from NESC Lab of Zhejiang University", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1590" } ], "trust": 0.6 }, "cve": "CVE-2020-5594", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-5594", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2020-46802", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-5594", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 10, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005854", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-5594", "trust": 1.0, "value": "CRITICAL" }, { "author": "IPA", "id": "JVNDB-2020-005854", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-46802", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1590", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2020-5594", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-46802" }, { "db": "VULMON", "id": "CVE-2020-5594" }, { "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "db": "CNNVD", "id": "CNNVD-202006-1590" }, { "db": "NVD", "id": "CVE-2020-5594" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules all versions contain a vulnerability that allows cleartext transmission of sensitive information between CPU modules and GX Works3 and/or GX Works2 via unspecified vectors. Mitsubishi Electric MELSEC iQ-R series, etc. are all a programmable logic controller of Japan\u0027s Mitsubishi Electric (Mitsubishi Electric) company. \n\r\n\r\nThere are security vulnerabilities in many Mitsubishi Electric products. The vulnerabilities stem from the use of clear text communication between the CPU module and GX Works3 or GX Works2. Attackers can use the vulnerabilities to eavesdrop or tamper with communication data, perform unauthorized operations, and cause denial of service", "sources": [ { "db": "NVD", "id": "CVE-2020-5594" }, { "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "db": "CNVD", "id": "CNVD-2020-46802" }, { "db": "VULMON", "id": "CVE-2020-5594" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-5594", "trust": 3.1 }, { "db": "JVN", "id": "JVNVU91424496", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-20-175-01", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2020-005854", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2020-46802", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2176", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202006-1590", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-5594", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-46802" }, { "db": "VULMON", "id": "CVE-2020-5594" }, { "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "db": "CNNVD", "id": "CNNVD-202006-1590" }, { "db": "NVD", "id": "CVE-2020-5594" } ] }, "id": "VAR-202006-1511", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-46802" } ], "trust": 1.3499999919999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-46802" } ] }, "last_update_date": "2024-11-23T22:33:25.234000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "MELSEC iQ-R\u3001iQ-F\u3001Q\u3001L\u3001FX\u30b7\u30ea\u30fc\u30ba \u306eCPU\u30e6\u30cb\u30c3\u30c8\u3068GX Works3\u304a\u3088\u3073GX Works2\u9593\u306e\u901a\u4fe1\u306b\u3001\u60c5\u5831\u6f0f\u3048\u3044\u3001\u60c5\u5831\u6539\u3056\u3093\u3001\u4e0d\u6b63\u64cd\u4f5c\u3001\u30b5\u30fc\u30d3\u30b9\u62d2\u5426(DoS)\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-003.pdf" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005854" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5594" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://jvn.jp/en/vu/jvnvu91424496/index.html" }, { "trust": 1.7, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-003.pdf" }, { "trust": 1.7, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-003_en.pdf" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-175-01" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5594" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu91424496" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-175-01" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5594" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2020/jvndb-2020-005854.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2176/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/319.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-46802" }, { "db": "VULMON", "id": "CVE-2020-5594" }, { "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "db": "CNNVD", "id": "CNNVD-202006-1590" }, { "db": "NVD", "id": "CVE-2020-5594" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-46802" }, { "db": "VULMON", "id": "CVE-2020-5594" }, { "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "db": "CNNVD", "id": "CNNVD-202006-1590" }, { "db": "NVD", "id": "CVE-2020-5594" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-19T00:00:00", "db": "CNVD", "id": "CNVD-2020-46802" }, { "date": "2020-06-23T00:00:00", "db": "VULMON", "id": "CVE-2020-5594" }, { "date": "2020-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "date": "2020-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1590" }, { "date": "2020-06-23T08:15:10.487000", "db": "NVD", "id": "CVE-2020-5594" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-19T00:00:00", "db": "CNVD", "id": "CNVD-2020-46802" }, { "date": "2020-07-01T00:00:00", "db": "VULMON", "id": "CVE-2020-5594" }, { "date": "2020-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005854" }, { "date": "2020-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1590" }, { "date": "2024-11-21T05:34:19.893000", "db": "NVD", "id": "CVE-2020-5594" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1590" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric MELSEC iQ-R , iQ-F , Q , L , FX Of the series CPU With the unit GX Works3 and GX Works2 Vulnerability in plaintext communication between", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005854" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1590" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…