Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU50839
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-20587
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error. A remote attacker can spoof MELSEC, GOT or FREQROL and return crafted reply packets, trigger heap-based buffer overflow and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSetting/monitoring tools for the C Controller module: All versions
CPU Module Logging Configuration Tool: All versions
CW Configurator: All versions
Data Transfer: All versions
EZSocket: All versions
Mitsubishi Electric FR Configurator2: All versions
FR Configurator: All versions
FR Configurator SW3: All versions
GT Designer3: All versions
GT SoftGOT1000 Version3: All versions
GT SoftGOT2000 Version1: All versions
GX Configurator-DP: 7.14Q
GX Configurator-QP: All versions
GX Developer: All versions
GX LogViewer: All versions
GX RemoteService-I: All versions
GX Works2: 1.597X
GX Works3: 1.070Y
M_CommDTM-HART: All versions
M_CommDTM-IO-Link: All versions
MELFA-Works: All versions
MELSEC WinCPU Setting Utility: All versions
MELSOFT EM Software Development Kit (EM Configurator): All versions
MELSOFT Navigator: All versions
MH11 SettingTool Version2: All versions
MI Configurator: All versions
MT Works2: All versions
MX Component: All versions
Network Interface Board CC IE Control utility: All versions
Network Interface Board CC IE Field Utility: All versions
Network Interface Board CC-Link Ver.2 Utility: All versions
Network Interface Board MNETH utility: All versions
PX Developer: All versions
RT ToolBox2: All versions
RT ToolBox3: All versions
SLMP Data Collector: All versions
Fixed software versionsCPE2.3 External links
http://jvn.jp/vu/JVNVU92330101/index.html
http://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU50840
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-20588
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of length parameter inconsistency. A remote attacker can spoof MELSEC, GOT or FREQROL, return crafted reply packets and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSetting/monitoring tools for the C Controller module: All versions
CPU Module Logging Configuration Tool: All versions
CW Configurator: All versions
Data Transfer: All versions
EZSocket: All versions
Mitsubishi Electric FR Configurator2: All versions
FR Configurator: All versions
FR Configurator SW3: All versions
GT Designer3: All versions
GT SoftGOT1000 Version3: All versions
GT SoftGOT2000 Version1: All versions
GX Configurator-DP: 7.14Q
GX Configurator-QP: All versions
GX Developer: All versions
GX LogViewer: All versions
GX RemoteService-I: All versions
GX Works2: 1.597X
GX Works3: 1.070Y
M_CommDTM-HART: All versions
M_CommDTM-IO-Link: All versions
MELFA-Works: All versions
MELSEC WinCPU Setting Utility: All versions
MELSOFT EM Software Development Kit (EM Configurator): All versions
MELSOFT Navigator: All versions
MH11 SettingTool Version2: All versions
MI Configurator: All versions
MT Works2: All versions
MX Component: All versions
Network Interface Board CC IE Control utility: All versions
Network Interface Board CC IE Field Utility: All versions
Network Interface Board CC-Link Ver.2 Utility: All versions
Network Interface Board MNETH utility: All versions
PX Developer: All versions
RT ToolBox2: All versions
RT ToolBox3: All versions
SLMP Data Collector: All versions
Fixed software versionsCPE2.3 External links
http://jvn.jp/vu/JVNVU92330101/index.html
http://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?