First published: Tue Jun 30 2020(Updated: )
Mitsubishi Electoric FA Engineering Software (CPU Module Logging Configuration Tool Ver. 1.94Y and earlier, CW Configurator Ver. 1.010L and earlier, EM Software Development Kit (EM Configurator) Ver. 1.010L and earlier, GT Designer3 (GOT2000) Ver. 1.221F and earlier, GX LogViewer Ver. 1.96A and earlier, GX Works2 Ver. 1.586L and earlier, GX Works3 Ver. 1.058L and earlier, M_CommDTM-HART Ver. 1.00A, M_CommDTM-IO-Link Ver. 1.02C and earlier, MELFA-Works Ver. 4.3 and earlier, MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool Ver.1.004E and earlier, MELSOFT FieldDeviceConfigurator Ver. 1.03D and earlier, MELSOFT iQ AppPortal Ver. 1.11M and earlier, MELSOFT Navigator Ver. 2.58L and earlier, MI Configurator Ver. 1.003D and earlier, Motion Control Setting Ver. 1.005F and earlier, MR Configurator2 Ver. 1.72A and earlier, MT Works2 Ver. 1.156N and earlier, RT ToolBox2 Ver. 3.72A and earlier, and RT ToolBox3 Ver. 1.50C and earlier) allows an attacker to conduct XML External Entity (XXE) attacks via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Cpu Module Logging Configuration Tool | <=1.94y | |
Mitsubishielectric Cw Configurator | <=1.010l | |
Mitsubishielectric Em Configurator | <=1.010l | |
Mitsubishielectric Gt Designer3 | <=1.221f | |
Mitsubishielectric Gx Logviewer | <=1.100e | |
Mitsubishielectric Gx Works2 | <=1.590q | |
Mitsubishielectric Gx Works3 | <=1.060n | |
Mitsubishielectric M Commdtm-hart | <=1.01b | |
Mitsubishielectric M Commdtm-io-link | <=1.03d | |
Mitsubishielectric Melfa-works | <=4.4 | |
Mitsubishielectric Melsec-l Flexible High-speed I\/o Control Module Configuration Tool | <=1.005f | |
Mitsubishielectric Melsoft Fielddeviceconfigurator | <=1.04e | |
Mitsubishielectric Melsoft Iq Appportal | <=1.14q | |
Mitsubishielectric Melsoft Navigator | <=2.62q | |
Mitsubishielectric Mi Configurator | <=1.004e | |
Mitsubishielectric Motion Control Setting | <=1.006g | |
Mitsubishielectric Mr Configurator2 | <=1.100e | |
Mitsubishielectric Mt Works2 | <=1.160s | |
Mitsubishielectric Rt Toolbox2 | <=3.73b | |
Mitsubishielectric Rt Toolbox3 | <=1.60n |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-5602 is high with a CVSS score of 7.5.
The affected software versions for CVE-2020-5602 include Mitsubishi Electoric FA Engineering Software CPU Module Logging Configuration Tool Ver. 1.94Y and earlier, CW Configurator Ver. 1.010L and earlier, EM Software Development Kit (EM Configurator) Ver. 1.010L and earlier, GT Designer3 (GOT2000) Ver. 1.221F and earlier, GX LogViewer Ver. 1.96A and earlier.
Yes, please refer to the Mitsubishi Electric PSIRT advisory for information on available fixes for CVE-2020-5602.
CVE-2020-5602 is a vulnerability that allows an attacker to execute arbitrary code or cause a denial of service on affected Mitsubishi Electric FA Engineering Software.
The Common Weakness Enumeration (CWE) ID for CVE-2020-5602 is 611.