SB2016120108 - Multiple vulnerabilities in Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module
Published: December 1, 2016 Updated: May 21, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2016-8370)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to usage of weak cryptographic algorithms. A remote attacker with ability to perform a man-on-the-middle attack can decrypt communication between client and PLC device.
2) Input validation error (CVE-ID: CVE-2016-8368)
The vulnerability allows a remote attacker to connect to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted packets to the PLC via port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation.
Remediation
Install update from vendor's website.