JVNVU#91553662
Denial-of-service (DoS) vulnerability in Mitsubishi Electric MELSOFT transmission port
Overview
MELSOFT transmission port (UDP/IP) of multiple Mistsubishi Electric MELSEC series contains a denial-of-service (DoS) vulnerability due to the uncontrolled resource consumption (CWE-400) isssue.
Products Affected
The units with MELSOFT transmission port (UDP/ID) on Ethernet port embedded in Mitsubishi Electric MELSEC series are affected:
- MELSEC iQ-R series (all versions)
- MELSEC iQ-F series (all versions)
- MELSEC Q series (all versions)
- MELSEC L series (all versions)
- MELSEC F series (all versions)
Description
MELSOFT transmission port (UDP/IP) of MELSEC iQ-R,iQ-F,Q,L, and F series provided by Mitsubishi Electric Coporation contains an uncontrolled resource consumption issue (CWE-400). When MELSOFT transmission port receives massive amount of data, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition.
Impact
When MELSOFT transmission port does not process data properly, a client becomes unable to communicate with MELSOFT transmission port. Also, the other devices which communicate using the other communication port may become unable to connect to MELSOFT transmission port.
According to the developer, this vulnerability only affects Ethernet communication functions.
Solution
Apply Workarounds
The developer states that this vulnerability does not affect sequential controls, and when a denial-of-service (DoS) condition is ended, the communication functions become to behave properly. Therefore there is no plan to provide any updates or patches to address to this issue.
However, according to the developer, applying the workaround listed below may mitigate the impacts of this vulnerability.
- Set up Firewall and restrict access from the devices via network
- Use IP address filter function and restrict IP addresses which can be connected to
Vendor Status
Vendor | Link |
Mitsubishi Electric Corporation | Remote Access Vulnerability in MELSOFT Transmission Port (UDP/IP) |
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Mitsubishi Electric Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solution through JVN.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2020-5527 |
JVN iPedia |
|
Update History
- 2020/04/01
- Added a link under the section [References]