[Japanese]
|
JVNDB-2020-000050
|
FANUC i Series CNC vulnerable to denial-of-service (DoS)
|
Fanuc i Series CNC provided by FANUC CORPORATION contains a denial-of-service (DoS) (CWE-400) vulnerability.
Industrial Control Security Laboratory of Qi An Xin Technology Group Inc. from China reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 4.3 (Medium) [IPA Score]
- Attack Vector: Adjacent Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
CVSS V2 Severity: Base Metrics 3.3 (Low) [IPA Score]
- Access Vector: Adjacent Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Partial
|
|
FANUC CORPORATION
- FANUC Power Motion i-MODEL A
- FANUC Series 0i-Mate D
- FANUC Series 0i-MODEL B
- FANUC Series 0i-MODEL C
- FANUC Series 0i-MODEL D
- FANUC Series 0i-MODEL F
- FANUC Series 0i-MODEL F Plus
- FANUC Series 16i/18i-WB
- FANUC Series 16i/18i/21i-MODEL B
- FANUC Series 30i/31i/32i-B Plus
- FANUC Series 30i/31i/32i-MODEL A
- FANUC Series 30i/31i/32i/35i-B
|
For the details, refer to the information provided by the developer (Registered Users Only).
|
A remote attacker may cause a denial-of-service (DoS) condition and access to the other devices may be blocked.
|
[Update the software or apply the patch]
The developer states that the updates/patches are available. For the details, refer to the information provided by the developer (Registered Users Only).
[Apply workaround]
Applying the following workaround may mitigate the impact of this vulnerability.
* Set up Firewall and restrict access from the devices via network.
|
FANUC CORPORATION
|
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2020-12739
|
- JVN : JVN#84959128
- National Vulnerability Database (NVD) : CVE-2020-12739
|
- [2020/07/31]
Web page was published
- [2020/08/03]
Overview : Credit was added
Common Vulnerabilities and Exposures (CVE) was modified
|