Path traversal in Mitsubishi Electric Factory Automation Products

Published: 2020-07-31

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Path traversal

EUVDB-ID: #VU32954

Risk: Medium


CVE-ID: CVE-2020-14523


Exploit availability:


The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.


Install update from vendor's website.

Vulnerable software versions

CW Configurator: 1.010L

Mitsubishi Electric FR Configurator2: 1.22Y

GX Works2: 1.595V

GX Works3: 1.063R

MELSEC iQ-R series: All versions

MELSOFT iQ AppPortal: All versions

MELSOFT Navigator: All versions

MI Configurator: All versions

MR Configurator2: All versions

MT Works2: 1.156N

MX Component: All versions

RT ToolBox3: 1.70Y

Fixed software versions

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?