First published: Mon Nov 02 2020(Updated: )
Improper access control vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Melsec Iq-rj71eip91 Firmware | ||
Mitsubishielectric Melsec Iq-rj71eip91 | ||
Mitsubishielectric Melsec Iq-rj71pn92 Firmware | ||
Mitsubishielectric Melsec Iq-rj71pn92 | ||
Mitsubishielectric Melsec Iq-rd81dl96 Firmware | ||
Mitsubishielectric Melsec Iq-rd81dl96 | ||
Mitsubishielectric Melsec Iq-rd81mes96n Firmware | ||
Mitsubishielectric Melsec Iq-rd81mes96n | ||
Mitsubishielectric Melsec Iq-rd81opc96 Firmware | ||
Mitsubishielectric Melsec Iq-rd81opc96 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5656 is an improper access control vulnerability in the TCP/IP function included in the firmware of MELSEC iQ-R series.
The following products are affected by CVE-2020-5656: RJ71EIP91 EtherNet/IP Network Interface Module, RJ71PN92 PROFINET IO Controller Module, RD81D series, and RD81MES.
CVE-2020-5656 has a severity score of 9.8 (Critical).
To fix CVE-2020-5656, it is recommended to update the firmware of the affected products to the latest version provided by Mitsubishi Electric.
You can find more information about CVE-2020-5656 at the following references: [Link 1](https://jvn.jp/vu/JVNVU92513419/index.html), [Link 2](https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-012.pdf), [Link 3](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-012_en.pdf).