First published: Mon Nov 02 2020(Updated: )
Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Melsec Iq-rj71eip91 Firmware | ||
Mitsubishielectric Melsec Iq-rj71eip91 | ||
Mitsubishielectric Melsec Iq-rj71pn92 Firmware | ||
Mitsubishielectric Melsec Iq-rj71pn92 | ||
Mitsubishielectric Melsec Iq-rd81dl96 Firmware | ||
Mitsubishielectric Melsec Iq-rd81dl96 | ||
Mitsubishielectric Melsec Iq-rd81mes96n Firmware | ||
Mitsubishielectric Melsec Iq-rd81mes96n | ||
Mitsubishielectric Melsec Iq-rd81opc96 Firmware | ||
Mitsubishielectric Melsec Iq-rd81opc96 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5657 is a vulnerability related to improper neutralization of argument delimiters in a command ('Argument Injection').
The MELSEC iQ-R series firmware, specifically the RJ71EIP91 EtherNet/IP Network Interface Module and RJ71PN92 PROFINET IO Controller Module, are affected by CVE-2020-5657.
CVE-2020-5657 has a severity rating of 6.5 (medium).
To fix CVE-2020-5657, apply the firmware updates provided by Mitsubishi Electric.
You can find more information about CVE-2020-5657 on the JVN and Mitsubishi Electric PSIRT websites.