First published: Fri Jan 14 2022(Updated: )
Improper initialization vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.16 and prior, FX3U-ENET-L Firmware version 1.16 and prior and FX3U-ENET-P502 Firmware version 1.16 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product by sending specially crafted packets. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Fx3u-enet Firmware | <=1.16 | |
Mitsubishielectric Fx3u-enet | ||
Mitsubishielectric Fx3u-enet-l Firmware | <=1.16 | |
Mitsubishielectric Fx3u-enet-l | ||
Mitsubishielectric Fx3u-enet-p502 Firmware | <=1.16 | |
Mitsubishielectric Fx3u-enet-p502 | ||
Mitsubishi Electric FX3U-ENET: Firmware Version 1.16 and prior | ||
Mitsubishi Electric FX3U-ENET-L: Firmware Version 1.16 and prior | ||
Mitsubishi Electric FX3U-ENET-P502: Firmware Version 1.16 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20613.
The severity of CVE-2021-20613 is high with a CVSS score of 7.5.
CVE-2021-20613 affects MELSEC-F series FX3U-ENET Firmware version 1.16 and prior, FX3U-ENET-L Firmware version 1.16 and prior, and FX3U-ENET-P502 Firmware version 1.16 and prior.
An attacker can exploit CVE-2021-20613 by sending specially crafted packets to the affected device, causing a denial-of-service (DoS) condition in communication functions.
Yes, Mitsubishi Electric has released a firmware update to address the vulnerability. Please refer to the vendor's advisory for more information.