CVE-2021-20596
https://notcve.org/view.php?id=CVE-2021-20596
NULL Pointer Dereference in MELSEC-F Series FX3U-ENET firmware version 1.14 and prior, FX3U-ENET-L firmware version 1.14 and prior and FX3U-ENET-P502 firmware version 1.14 and prior allows a remote unauthenticated attacker to cause a DoS condition in communication by sending specially crafted packets. Control by MELSEC-F series PLC is not affected and system reset is required for recovery. Una desreferencia de puntero NULL en MELSEC-F Series FX3U-ENET versiones de firmware 1.14 y anteriores, FX3U-ENET-L versiones de firmware 1.14 y anteriores, y FX3U-ENET-P502 versiones de firmware 1.14 y anteriores, permite a un atacante remoto no autenticado causar una condición de Denegación de Servicio en la comunicación mediante el envío de paquetes especialmente diseñados. El control por parte del PLC de la serie MELSEC-F no está afectado y es requerido un reinicio del sistema para la recuperación • https://jvn.jp/vu/JVNVU94348759/index.html https://us-cert.cisa.gov/ics/advisories/icsa-21-201-01 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-006_en.pdf • CWE-476: NULL Pointer Dereference •
CVE-2020-16226 – Mitsubishi Electric Multiple Products
https://notcve.org/view.php?id=CVE-2020-16226
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. Múltiples productos de Mitsubishi Electric, son vulnerables a suplantaciones de un dispositivo legítimo por parte de un actor malicioso, lo que puede permitir a un atacante ejecutar comandos arbitrarios remotamente This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mitsubishi Electric MELSEC iQ-F. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. • https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 • CWE-342: Predictable Exact Value from Previous Values •
CVE-2020-5527
https://notcve.org/view.php?id=CVE-2020-5527
When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions. Cuando el puerto de transmisión de MELSOFT (UDP/IP) de la serie Mitsubishi Electric MELSEC iQ-R (todas las versiones), la serie MELSEC iQ-F (todas las versiones), la serie MELSEC Q (todas las versiones), la serie MELSEC L (todas las versiones) y la serie MELSEC F (todas las versiones), recibe una cantidad masiva de datos por medio de vectores no especificados, un consumo de recursos se presenta y el puerto no procesa los datos apropiadamente. Como resultado, puede caer en una condición de denegación de servicio (DoS). • https://jvn.jp/en/vu/JVNVU91553662/index.html https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-005_en.pdf • CWE-400: Uncontrolled Resource Consumption •