JVNVU#95413676
Multiple vulnerabilities in TCP/IP function on Mitsubishi Electric GOT2000 series
Overview
Mitsubishi Electric GOT2000 series contain multiple vulnerabilities.
Products Affected
CoreOS with version -Y and earlier installed in the models listed below:
- GT27 Model
- GT25 Model
- GT23 Model
Description
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series GT27, GT25, and GT23 contains multiple vulnerabilities listed below.
- Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) - CVE-2020-5595
- Session Fixation (CWE-384) - CVE-2020-5596
- NULL Pointer Dereference (CWE-476) - CVE-2020-5597
- Improper Access Control (CWE-284) - CVE-2020-5598
- Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (CWE-88) - CVE-2020-5599
- Resource Management Errors (CWE-399) - CVE-2020-5560
Impact
By receiving a packet which is specially crafted by an attacker, the network functions of the products may be stopped or a malicious program may be executed.
Solution
Update the Software
Update the CoreOS to the latest version according to the information provided by the developer.
- Contact your local sales office about MELSOFT GT Designer3(2000) to obtain MELSOFT GT Designer3(2000) 1.240A and later version, and install it.
- Launch MELSOFT GT Designer3(2000) and create CoreOS with version Z and later in an SD card.
- Insert the SD card to the affected product, then update CoreOS to the latest version.
Apply the Workaround
Restricting access from the untrusted networks or hosts may mitigate the impacts of these vulnerabilities.
For the details, refer to the information provided by the developer.
Vendor Status
Vendor | Link |
Mitsubishi Electric Corporation | Multiple vulnerabilities in TCP/IP Stack on GOT2000 Series |
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
Mitsubishi Electric Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solution through JVN.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2020-5595 |
CVE-2020-5596 |
|
CVE-2020-5597 |
|
CVE-2020-5598 |
|
CVE-2020-5599 |
|
CVE-2020-5600 |
|
JVN iPedia |
|
Update History
- 2020/07/08
- Added ICS Advisory link to [References] section.