[Japanese]
|
JVNDB-2020-006469
|
Multiple vulnerabilities in TCP/IP function on Mitsubishi Electric GOT2000 series
|
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series GT27, GT25, and GT23 contains multiple vulnerabilities listed below.
* Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) - CVE-2020-5595
* Session Fixation (CWE-384) - CVE-2020-5596
* NULL Pointer Dereference (CWE-476) - CVE-2020-5597
* Improper Access Control (CWE-284) - CVE-2020-5598
* Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (CWE-88) - CVE-2020-5599
* Resource Management Errors (CWE-399) - CVE-2020-5560
|
CVSS V3 Severity: Base Metrics 9.8 (Critical) [Other]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVSS V2 Severity: Base Metrics 10.0 (High) [NVD Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Complete
- Integrity Impact: Complete
- Availability Impact: Complete
|
|
Mitsubishi Electric
- GT23 Model
- GT25 Model
- GT27 Model
|
|
By receiving a packet which is specially crafted by an attacker, the network functions of the products may be stopped or a malicious program may be executed.
|
[Update the Software]
Update the CoreOS to the latest version according to the information provided by the developer.
1.Contact your local sales office about MELSOFT GT Designer3(2000) to obtain MELSOFT GT Designer3(2000) 1.240A and later version, and install it.
2.Launch MELSOFT GT Designer3(2000) and create CoreOS with version Z and later in an SD card.
3.Insert the SD card to the affected product, then update CoreOS to the latest version.
[Apply the Workaround]
Restricting access from the untrusted networks or hosts may mitigate the impacts of these vulnerabilities.
For the details, refer to the information provided by the developer.
|
Mitsubishi Electric
|
- Buffer Errors(CWE-119) [Other]
- Improper Access Control(CWE-284) [Other]
- Session Fixation(CWE-384) [Other]
- Resource Management Errors(CWE-399) [Other]
- NULL Pointer Dereference(CWE-476) [Other]
- Argument Injection or Modification(CWE-88) [Other]
|
- CVE-2020-5595
- CVE-2020-5596
- CVE-2020-5597
- CVE-2020-5598
- CVE-2020-5599
- CVE-2020-5600
|
- JVN : JVNVU#95413676
- National Vulnerability Database (NVD) : CVE-2020-5595
- National Vulnerability Database (NVD) : CVE-2020-5596
- National Vulnerability Database (NVD) : CVE-2020-5597
- National Vulnerability Database (NVD) : CVE-2020-5598
- National Vulnerability Database (NVD) : CVE-2020-5599
- National Vulnerability Database (NVD) : CVE-2020-5600
- ICS-CERT ADVISORY : ICSA-20-189-02
|
- [2020/07/09]
Web page was published
|