SB2020110212 - Multiple vulnerabilities in Mitsubishi Electric MELSEC iQ-R
Published: November 2, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2020-5653)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote attacker can send a specially crafted packet, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
This vulnerability affects the following modules of MELSEC iQ-R Series:
- EtherNet/IP Network Interface Module, RJ71EIP91: First 2 digits of serial number are 02 or before.
- PROFINET IO Controller Module, RJ71PN92: First 2 digits of serial number are 01 or before
- High Speed Data Logger Module,RD81DL96: First 2 digits of serial number are 08 or before
- MES Interface Module, RD81MES96N: First 2 digits of serial number are 04 or before
- OPC UA Server Module, RD81OPC96: First 2 digits of serial number are 04 or before
2) Session Fixation (CVE-ID: CVE-2020-5654)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the session invalidation issue. A remote attacker can send a specially crafted packet and cause a denial of service condition on the target system.
This vulnerability affects the following modules of MELSEC iQ-R Series:
- EtherNet/IP Network Interface Module, RJ71EIP91: First 2 digits of serial number are 02 or before.
- PROFINET IO Controller Module, RJ71PN92: First 2 digits of serial number are 01 or before
- High Speed Data Logger Module,RD81DL96: First 2 digits of serial number are 08 or before
- MES Interface Module, RD81MES96N: First 2 digits of serial number are 04 or before
- OPC UA Server Module, RD81OPC96: First 2 digits of serial number are 04 or before
3) NULL Pointer Dereference (CVE-ID: CVE-2020-5655)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
This vulnerability affects the following modules of MELSEC iQ-R Series:
- EtherNet/IP Network Interface Module, RJ71EIP91: First 2 digits of serial number are 02 or before.
- PROFINET IO Controller Module, RJ71PN92: First 2 digits of serial number are 01 or before
- High Speed Data Logger Module,RD81DL96: First 2 digits of serial number are 08 or before
- MES Interface Module, RD81MES96N: First 2 digits of serial number are 04 or before
- OPC UA Server Module, RD81OPC96: First 2 digits of serial number are 04 or before
4) Improper Access Control (CVE-ID: CVE-2020-5656)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
This vulnerability affects the following modules of MELSEC iQ-R Series:
- EtherNet/IP Network Interface Module, RJ71EIP91: First 2 digits of serial number are 02 or before.
- PROFINET IO Controller Module, RJ71PN92: First 2 digits of serial number are 01 or before
- High Speed Data Logger Module,RD81DL96: First 2 digits of serial number are 08 or before
- MES Interface Module, RD81MES96N: First 2 digits of serial number are 04 or before
- OPC UA Server Module, RD81OPC96: First 2 digits of serial number are 04 or before
5) Improper Neutralization of Argument Delimiters in a Command (CVE-ID: CVE-2020-5657)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability due to improper neutralization of argument delimiters in a command. A remote attacker on the local network can send a specially crafted packet and cause a denial-of-service condition or execute arbitrary code.
This vulnerability affects the following modules of MELSEC iQ-R Series:
- EtherNet/IP Network Interface Module, RJ71EIP91: First 2 digits of serial number are 02 or before.
- PROFINET IO Controller Module, RJ71PN92: First 2 digits of serial number are 01 or before
- High Speed Data Logger Module,RD81DL96: First 2 digits of serial number are 08 or before
- MES Interface Module, RD81MES96N: First 2 digits of serial number are 04 or before
- OPC UA Server Module, RD81OPC96: First 2 digits of serial number are 04 or before
6) Resource management error (CVE-ID: CVE-2020-5658)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
This vulnerability affects the following modules of MELSEC iQ-R Series:
- EtherNet/IP Network Interface Module, RJ71EIP91: First 2 digits of serial number are 02 or before.
- PROFINET IO Controller Module, RJ71PN92: First 2 digits of serial number are 01 or before
- High Speed Data Logger Module,RD81DL96: First 2 digits of serial number are 08 or before
- MES Interface Module, RD81MES96N: First 2 digits of serial number are 04 or before
- OPC UA Server Module, RD81OPC96: First 2 digits of serial number are 04 or before
Remediation
Install update from vendor's website.