Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU29429
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-5602
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied XML input. A remote attacker can send a specially crafted file on the computer running the product to the outside and view contents of arbitrary files on the system or initiate requests to external systems.
Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCPU Module Logging Configuration Tool: 1.94Y
CW Configurator: 1.010L
EM Software Development Kit: 1.010L
GT Designer3: 1.221F
GX LogViewer: 1.96A
GX Works2: 1.586L
GX Works3: 1.058L
M_CommDTM-HART: 1.00A
M_CommDTM-IO-Link: 1.02C
MELFA-Works: 4.3
MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool: 1.004E
MELSOFT FieldDeviceConfigurator: 1.03D
MELSOFT iQ AppPortal: 1.11M
MELSOFT Navigator: 1.003D
MI Configurator: 1.003D
Motion Control Setting: 1.005F
MR Configurator2: 1.72A
MT Works2: 1.156N
RT ToolBox2: 3.72A
RT ToolBox3: 1.50C
Fixed software versionsCPE2.3 External links
http://jvn.jp/en/vu/JVNVU90307594/index.html
http://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU29430
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-5603
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCPU Module Logging Configuration Tool: 1.94Y
CW Configurator: 1.010L
EM Software Development Kit: 1.010L
GT Designer3: 1.221F
GX LogViewer: 1.96A
GX Works2: 1.586L
GX Works3: 1.058L
M_CommDTM-HART: 1.00A
M_CommDTM-IO-Link: 1.02C
MELFA-Works: 4.3
MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool: 1.004E
MELSOFT FieldDeviceConfigurator: 1.03D
MELSOFT iQ AppPortal: 1.11M
MELSOFT Navigator: 1.003D
MI Configurator: 1.003D
Motion Control Setting: 1.005F
MR Configurator2: 1.72A
MT Works2: 1.156N
RT ToolBox2: 3.72A
RT ToolBox3: 1.50C
Fixed software versionsCPE2.3 External links
http://jvn.jp/en/vu/JVNVU90307594/index.html
http://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-004_en.pdf
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?