7.8
CWE
665
Advisory Published
Updated

CVE-2021-20613

First published: Fri Jan 14 2022(Updated: )

Improper initialization vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.16 and prior, FX3U-ENET-L Firmware version 1.16 and prior and FX3U-ENET-P502 Firmware version 1.16 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product by sending specially crafted packets. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery.

Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp

Affected SoftwareAffected VersionHow to fix
Mitsubishielectric Fx3u-enet Firmware<=1.16
Mitsubishielectric Fx3u-enet
Mitsubishielectric Fx3u-enet-l Firmware<=1.16
Mitsubishielectric Fx3u-enet-l
Mitsubishielectric Fx3u-enet-p502 Firmware<=1.16
Mitsubishielectric Fx3u-enet-p502
Mitsubishi Electric FX3U-ENET: Firmware Version 1.16 and prior
Mitsubishi Electric FX3U-ENET-L: Firmware Version 1.16 and prior
Mitsubishi Electric FX3U-ENET-P502: Firmware Version 1.16 and prior

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID?

    The vulnerability ID is CVE-2021-20613.

  • What is the severity of CVE-2021-20613?

    The severity of CVE-2021-20613 is high with a CVSS score of 7.5.

  • Which software versions are affected by CVE-2021-20613?

    CVE-2021-20613 affects MELSEC-F series FX3U-ENET Firmware version 1.16 and prior, FX3U-ENET-L Firmware version 1.16 and prior, and FX3U-ENET-P502 Firmware version 1.16 and prior.

  • How can an attacker exploit CVE-2021-20613?

    An attacker can exploit CVE-2021-20613 by sending specially crafted packets to the affected device, causing a denial-of-service (DoS) condition in communication functions.

  • Are there any fixes available for CVE-2021-20613?

    Yes, Mitsubishi Electric has released a firmware update to address the vulnerability. Please refer to the vendor's advisory for more information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203