First published: Tue Jun 30 2020(Updated: )
Mitsubishi Electoric FA Engineering Software (CPU Module Logging Configuration Tool Ver. 1.94Y and earlier, CW Configurator Ver. 1.010L and earlier, EM Software Development Kit (EM Configurator) Ver. 1.010L and earlier, GT Designer3 (GOT2000) Ver. 1.221F and earlier, GX LogViewer Ver. 1.96A and earlier, GX Works2 Ver. 1.586L and earlier, GX Works3 Ver. 1.058L and earlier, M_CommDTM-HART Ver. 1.00A, M_CommDTM-IO-Link Ver. 1.02C and earlier, MELFA-Works Ver. 4.3 and earlier, MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool Ver.1.004E and earlier, MELSOFT FieldDeviceConfigurator Ver. 1.03D and earlier, MELSOFT iQ AppPortal Ver. 1.11M and earlier, MELSOFT Navigator Ver. 2.58L and earlier, MI Configurator Ver. 1.003D and earlier, Motion Control Setting Ver. 1.005F and earlier, MR Configurator2 Ver. 1.72A and earlier, MT Works2 Ver. 1.156N and earlier, RT ToolBox2 Ver. 3.72A and earlier, and RT ToolBox3 Ver. 1.50C and earlier) allows an attacker to conduct XML External Entity (XXE) attacks via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishi Electric CPU Module Logging Configuration Tool | <=1.94y | |
Mitsubishi Electric CW Configurator | <=1.010l | |
Mitsubishi Electric Em Configurator | <=1.010l | |
Mitsubishi Electric GT Designer 3 | <=1.221f | |
Mitsubishi Electric GX LogViewer | <=1.100e | |
Mitsubishi Electric GX Works2 | <=1.590q | |
Mitsubishi Electric GX Works3 | <=1.060n | |
Mitsubishi Electric M Commdtm-HART | <=1.01b | |
Mitsubishi Electric M Commdtm IO-Link | <=1.03d | |
Mitsubishi Electric MELFA-Works | <=4.4 | |
Mitsubishi Electric Melsec-L Flexible High-speed I/O Control Module Configuration Tool | <=1.005f | |
Mitsubishi Electric MELSOFT FieldDeviceConfigurator | <=1.04e | |
Mitsubishi Electric Melsoft IQ AppPortal | <=1.14q | |
Mitsubishi Electric iQ Works (MELSOFT Navigator) | <=2.62q | |
Mitsubishi Electric MI Configurator | <=1.004e | |
Mitsubishi Electric Motion Control Setting | <=1.006g | |
Mitsubishi Electric MR Configurator2 | <=1.100e | |
Mitsubishi Electric MT Works2 | <=1.160s | |
Mitsubishi Electric RT Toolbox2 | <=3.73b | |
Mitsubishi Electric RT Toolbox 3 | <=1.60n |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-5602 is high with a CVSS score of 7.5.
The affected software versions for CVE-2020-5602 include Mitsubishi Electoric FA Engineering Software CPU Module Logging Configuration Tool Ver. 1.94Y and earlier, CW Configurator Ver. 1.010L and earlier, EM Software Development Kit (EM Configurator) Ver. 1.010L and earlier, GT Designer3 (GOT2000) Ver. 1.221F and earlier, GX LogViewer Ver. 1.96A and earlier.
Yes, please refer to the Mitsubishi Electric PSIRT advisory for information on available fixes for CVE-2020-5602.
CVE-2020-5602 is a vulnerability that allows an attacker to execute arbitrary code or cause a denial of service on affected Mitsubishi Electric FA Engineering Software.
The Common Weakness Enumeration (CWE) ID for CVE-2020-5602 is 611.