ID

VAR-202011-1259


CVE

CVE-2020-5666


TITLE

MELSEC iQ-R Series sequencer CPU Resource exhaustion vulnerability in the unit

Trust: 0.8

sources: JVNDB: JVNDB-2020-000072

DESCRIPTION

Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series CPU Modules (R00/01/02CPU Firmware versions from '05' to '19' and R04/08/16/32/120(EN)CPU Firmware versions from '35' to '51') allows a remote attacker to cause an error in a CPU unit via a specially crafted HTTP packet, which may lead to a denial-of-service (DoS) condition in execution of the program and its communication. Provided by Mitsubishi Electric Corporation MELSEC iQ-R Of the series CPU The unit is exhausted (CWE-400) Vulnerability exists. According to the developer, the engineering tool " Web If the "whether or not server is used" setting is set to "not used", it is not affected by this vulnerability. ( The default setting is "not used" ) .. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : NEC Corporation Tomoomi Iwata Mr. A reset is required for recovery

Trust: 1.62

sources: NVD: CVE-2020-5666 // JVNDB: JVNDB-2020-000072

AFFECTED PRODUCTS

vendor:mitsubishielectricmodel:melsec iq-r16scope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r02scope:gteversion:05

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r01scope:gteversion:05

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r02scope:lteversion:19

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r16scope:gteversion:35

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r08scope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r01scope:lteversion:19

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r04scope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r00scope:lteversion:19

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r08scope:gteversion:35

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r120scope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r32scope:lteversion:51

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r120scope:gteversion:35

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r04scope:gteversion:35

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r32scope:gteversion:35

Trust: 1.0

vendor:mitsubishielectricmodel:melsec iq-r00scope:gteversion:05

Trust: 1.0

vendor:mitsubishi electricmodel:melsec iq-r seriesscope:eqversion:r00/01/02cpu ファームウェアバージョン "05" から "19"

Trust: 0.8

vendor:mitsubishi electricmodel:melsec iq-r seriesscope:eqversion:r04/08/16/32/120(en)cpu ファームウェアバージョン "35" から "51"

Trust: 0.8

sources: JVNDB: JVNDB-2020-000072 // NVD: CVE-2020-5666

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-5666
value: HIGH

Trust: 1.0

IPA: JVNDB-2020-000072
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202011-1002
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-5666
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2020-000072
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2020-5666
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

IPA: JVNDB-2020-000072
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-000072 // CNNVD: CNNVD-202011-1002 // NVD: CVE-2020-5666

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2020-000072 // NVD: CVE-2020-5666

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202011-1002

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202011-1002

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-000072

PATCH

title:MELSEC iQ-R シリーズ CPU ユニットにおけるサービス拒否 (DoS) の脆弱性url:https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-015.pdf

Trust: 0.8

title:Mitsubishi Electric MELSEC iQ-R series Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=135734

Trust: 0.6

sources: JVNDB: JVNDB-2020-000072 // CNNVD: CNNVD-202011-1002

EXTERNAL IDS

db:JVNid:JVN44764844

Trust: 2.4

db:ICS CERTid:ICSA-20-317-01

Trust: 2.4

db:NVDid:CVE-2020-5666

Trust: 2.4

db:JVNDBid:JVNDB-2020-000072

Trust: 1.4

db:AUSCERTid:ESB-2020.4044

Trust: 0.6

db:CNNVDid:CNNVD-202011-1002

Trust: 0.6

sources: JVNDB: JVNDB-2020-000072 // CNNVD: CNNVD-202011-1002 // NVD: CVE-2020-5666

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-317-01

Trust: 3.0

url:https://jvn.jp/jp/jvn44764844/index.html

Trust: 2.4

url:https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-015_en.pdf

Trust: 1.6

url:https://jvn.jp/en/jp/jvn44764844/index.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5666

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.4044/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-5666

Trust: 0.6

url:https://jvndb.jvn.jp/en/contents/2020/jvndb-2020-000072.html

Trust: 0.6

sources: JVNDB: JVNDB-2020-000072 // CNNVD: CNNVD-202011-1002 // NVD: CVE-2020-5666

SOURCES

db:JVNDBid:JVNDB-2020-000072
db:CNNVDid:CNNVD-202011-1002
db:NVDid:CVE-2020-5666

LAST UPDATE DATE

2024-11-23T22:05:19.579000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-000072date:2020-11-13T02:24:14
db:CNNVDid:CNNVD-202011-1002date:2020-12-04T00:00:00
db:NVDid:CVE-2020-5666date:2024-11-21T05:34:26.980

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-000072date:2020-11-12T03:28:15
db:CNNVDid:CNNVD-202011-1002date:2020-11-12T00:00:00
db:NVDid:CVE-2020-5666date:2020-11-16T01:15:13.327