First published: Tue Jul 07 2020(Updated: )
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Coreos | <=y | |
Mitsubishielectric Got2000 Gt23 | ||
Mitsubishielectric Got2000 Gt25 | ||
Mitsubishielectric Got2000 Gt27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5599 is a vulnerability in the TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series.
CVE-2020-5599 has a severity rating of 9.8 (Critical).
The affected software for CVE-2020-5599 is the CoreOS with version -Y installed in GT27 Model, GT25 Model, and GT23 Model of Mitsubishi Electric GOT2000 series.
CVE-2020-5599 can be exploited through improper neutralization of argument delimiters in a command ('Argument Injection').
You can find more information about CVE-2020-5599 at the Japanese Vulnerability Notes (JVN) website and the Mitsubishi Electric Product Security Incident Response Team (PSIRT) website.