var-202007-0208
Vulnerability from variot
A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior. Several Mitsubishi Electric products contain vulnerabilities related to unreliable data deserialization.Service operation interruption (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists with the handling of serialized objects. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Mitsubishi Electric MC Works64 and MC Works32 are a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "electric mc works64 \u003c=4.02c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "(10.95.208.31)" }, { "_id": null, "model": "energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "mc works", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.208.31" }, { "_id": null, "model": "mobilehmi", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "facility analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "mc works32", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "9.50.255.02" }, { "_id": null, "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "genesis32", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "quality analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "hyper historian", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "smart energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "_id": null, "model": "bizviz", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "energy analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "facility analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "genesis32", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "hyper historian", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "mobilehmi", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "quality analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "smart energy analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "_id": null, "model": "mc works", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "64" }, { "_id": null, "model": "mc works 32", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "_id": null, "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null }, { "_id": null, "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "(9.50.255.02)" }, { "_id": null, "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.4, "vendor": "mitsubishi", "version": "(9.50.255.02)*" } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:iconics:bizviz", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:energy_analytix", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:facility_analytix", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:genesis64", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:genesis32", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:hyper_historian", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:mobilehmi", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:quality_analytix", "vulnerable": true }, { "cpe22Uri": "cpe:/a:iconics:smart_energy_analytix", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mitsubishielectric:mc_works", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mitsubishielectric:mc_works32", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008308" } ] }, "credits": { "_id": null, "data": "Chris Anastasio (muffin) and Steven Seeley (mr_me) of Incite Team", "sources": [ { "db": "ZDI", "id": "ZDI-20-780" } ], "trust": 0.7 }, "cve": "CVE-2020-12015", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-12015", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-008308", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-34372", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "31ad87c7-757e-410a-89c6-906cc763b446", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-12015", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-008308", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12015", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12015", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-008308", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-12015", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-34372", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1209", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" }, { "db": "NVD", "id": "CVE-2020-12015" } ] }, "description": { "_id": null, "data": "A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior. Several Mitsubishi Electric products contain vulnerabilities related to unreliable data deserialization.Service operation interruption (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists with the handling of serialized objects. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Mitsubishi Electric MC Works64 and MC Works32 are a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided", "sources": [ { "db": "NVD", "id": "CVE-2020-12015" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" } ], "trust": 3.15 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-12015", "trust": 4.1 }, { "db": "ICS CERT", "id": "ICSA-20-170-02", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-20-170-03", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-20-780", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2020-34372", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-202006-1209", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU95379131", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-008308", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10297", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.2147", "trust": 0.6 }, { "db": "IVD", "id": "4BDA61CA-BD50-4B09-A018-05EA35FF2332", "trust": 0.2 }, { "db": "IVD", "id": "31AD87C7-757E-410A-89C6-906CC763B446", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" }, { "db": "NVD", "id": "CVE-2020-12015" } ] }, "id": "VAR-202007-0208", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "CNVD", "id": "CNVD-2020-34372" } ], "trust": 1.78927874 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "CNVD", "id": "CNVD-2020-34372" } ] }, "last_update_date": "2024-11-23T22:11:26.711000Z", "patch": { "_id": null, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://iconics.com/" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/" }, { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "title": "Patch for Mitsubishi Electric MC Works64 and MC Works32 code issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/222933" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-502", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" } ] }, "references": { "_id": null, "data": [ { "trust": 2.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" }, { "trust": 2.3, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12015" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12015" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95379131/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis32-genesis64-multiple-vulnerabilities-32668" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-780/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2147/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" }, { "db": "NVD", "id": "CVE-2020-12015" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332", "ident": null }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446", "ident": null }, { "db": "ZDI", "id": "ZDI-20-780", "ident": null }, { "db": "CNVD", "id": "CNVD-2020-34372", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2020-008308", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202006-1209", "ident": null }, { "db": "NVD", "id": "CVE-2020-12015", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332", "ident": null }, { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446", "ident": null }, { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-780", "ident": null }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34372", "ident": null }, { "date": "2020-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008308", "ident": null }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1209", "ident": null }, { "date": "2020-07-16T22:15:11.493000", "db": "NVD", "id": "CVE-2020-12015", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-780", "ident": null }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34372", "ident": null }, { "date": "2020-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008308", "ident": null }, { "date": "2020-07-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1209", "ident": null }, { "date": "2024-11-21T04:59:07.153000", "db": "NVD", "id": "CVE-2020-12015", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1209" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Unreliable data deserialization vulnerabilities in multiple MC products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008308" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Code problem", "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" } ], "trust": 1.0 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.