First published: Thu Jul 16 2020(Updated: )
A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Mc Works | <=10.95.208.31 | |
Mitsubishielectric Mc Works32 | =9.50.255.02 | |
Iconics Energy Analytix | ||
Iconics Facility Analytix | ||
ICONICS GENESIS64 | ||
ICONICS Hyper Historian | ||
ICONICS MobileHMI | ||
Iconics Quality Analytix | ||
Iconics Smart Energy Analytix | ||
ICONICS BizViz | ||
ICONICS GENESIS32 | ||
ICONICS GENESIS64 | ||
ICONICS Hyper Historian | ||
ICONICS AnalytiX | ||
ICONICS MobileHMI | ||
Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions | ||
Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12015 is a vulnerability in Mitsubishi Electric MC Works64 and MC Works32 that allows for a denial-of-service attack via a specially crafted communication packet.
The vulnerability affects Mitsubishi Electric MC Works64 version 4.02C and earlier, all versions, as well as Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02).
CVE-2020-12015 has a severity score of 7.5, which is considered high.
CVE-2020-12015 can be exploited by sending a specially crafted communication packet to the affected systems.
Yes, you can find more information about CVE-2020-12015 at the following references: [Reference 1](https://www.us-cert.gov/ics/advisories/icsa-20-170-02), [Reference 2](https://www.us-cert.gov/ics/advisories/icsa-20-170-03).