6 results (0.001 seconds)

CVSS: 9.1EPSS: 0%CPEs: 106EXPL: 0

Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DSS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versions 1.042 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versions 1.043 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versions 1.003 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versions 33 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versions 66 and prior allows a remote unauthenticated attacker to access the Web server function by guessing the random numbers used for authentication from several used random numbers. • https://jvn.jp/vu/JVNVU99673580/index.html https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-019_en.pdf • CWE-335: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) CWE-337: Predictable Seed in Pseudo-Random Number Generator (PRNG) •

CVSS: 7.8EPSS: 0%CPEs: 40EXPL: 0

Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to prevent legitimate clients from connecting to the MELSOFT transmission port (TCP/IP) by not closing a connection properly, which may lead to a denial of service (DoS) condition. Una vulnerabilidad de Consumo Incontrolado de Recursos en Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU todas las versiones, R04/08/16/32/120(ES)CPU todas las versiones, R08/16/32/120SFCPU todas las versiones, R08/16/32/120PCPU todas las versiones, R08/16/32/120PSFCPU todas las versiones) permite a un atacante remoto no autentificado impedir que clientes legítimos se conecten al puerto de transmisión de MELSOFT (TCP/IP) al no cerrar una conexión apropiadamente, lo que puede conllevar a una condición de denegación de servicio (DoS) • https://jvn.jp/vu/JVNVU98060539/index.html https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 38EXPL: 0

Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2. Los PLC de la serie Mitsubishi MELSEC iQ-R con firmware 49 permiten a un atacante no autenticado detener el proceso industrial enviando un paquete diseñado a través de la red. • https://blog.scadafence.com/vulnerability-in-mitsubishi-electric-melsec-iq-r-series https://us-cert.cisa.gov/ics/advisories/icsa-20-282-02 • CWE-20: Improper Input Validation CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 1%CPEs: 56EXPL: 0

Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series modules (R00/01/02CPU firmware version '19' and earlier, R04/08/16/32/120 (EN) CPU firmware version '51' and earlier, R08/16/32/120SFCPU firmware version '22' and earlier, R08/16/32/120PCPU firmware version '25' and earlier, R08/16/32/120PSFCPU firmware version '06' and earlier, RJ71EN71 firmware version '47' and earlier, RJ71GF11-T2 firmware version '47' and earlier, RJ72GF15-T2 firmware version '07' and earlier, RJ71GP21-SX firmware version '47' and earlier, RJ71GP21S-SX firmware version '47' and earlier, and RJ71GN11-T2 firmware version '11' and earlier) allows a remote unauthenticated attacker to cause an error in a CPU unit and cause a denial-of-service (DoS) condition in execution of the program and its communication, or to cause a denial-of-service (DoS) condition in communication via the unit by receiving a specially crafted SLMP packet Vulnerabilidad de consumo incontrolado de recursos en los módulos de la serie iQ-R de MELSEC (R00/01/02CPU firmware versión '19' y anteriores, R04/08/16/32/120 (ES) CPU firmware versión '51' y anteriores, R08/16/32/120SFCPU firmware versión '22' y anteriores, R08/16/32/120PCPU firmware versión '25' y anterior, R08/16/32/120PSFCPU firmware versión '06' y anterior, RJ71EN71 firmware versión '47' y anterior, RJ71GF11-T2 firmware versión '47' y anterior, RJ72GF15-T2 firmware versión '07' y anterior, RJ71GP21-SX firmware versión '47' y anterior, RJ71GP21S-SX firmware versión '47' y anterior, y RJ71GN11-T2 firmware versión '11' y anteriores) permite a un atacante remoto no autentificado provocar un error en una CPU y causar una condición de denegación de servicio (DoS) en la ejecución del programa y su comunicación, o causar una condición de denegación de servicio (DoS) en la comunicación a través de la unidad mediante la recepción de un paquete SLMP especialmente diseñado • https://jvn.jp/vu/JVNVU95980140/index.html https://us-cert.cisa.gov/ics/advisories/icsa-20-324-05 https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-016.pdf https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-016_en.pdf • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

Mitsubishi MELSEC iQ-R Series PLCs with firmware 33 allow attackers to halt the industrial process by sending an unauthenticated crafted packet over the network, because this denial of service attack consumes excessive CPU time. After halting, physical access to the PLC is required in order to restore production. Los PLC Mitsubishi MELSEC iQ-R Series con firmware 33, permiten a atacantes detener el proceso industrial mediante el envío de un paquete diseñado no autenticado a través de la red, porque este ataque de denegación de servicio consume un tiempo excesivo de la CPU. Después de detenerse, se requiere acceso físico al PLC para restaurar producción • http://jvn.jp/vu/JVNVU97662844/index.html https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-001_en.pdf https://www.us-cert.gov/ics/advisories/icsa-20-161-02 • CWE-400: Uncontrolled Resource Consumption •