CVE-2020-16226 – Mitsubishi Electric Multiple Products
https://notcve.org/view.php?id=CVE-2020-16226
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. Múltiples productos de Mitsubishi Electric, son vulnerables a suplantaciones de un dispositivo legítimo por parte de un actor malicioso, lo que puede permitir a un atacante ejecutar comandos arbitrarios remotamente This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mitsubishi Electric MELSEC iQ-F. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of ACK packets. When generating ACK packets, the application uses a predictable sequence number. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. • https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01 • CWE-342: Predictable Exact Value from Previous Values •
CVE-2020-5531
https://notcve.org/view.php?id=CVE-2020-5531
Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000 MELSEC-Q Series C Controller Module(Q24DHCCPU-V, Q24DHCCPU-VG User Ethernet port (CH1, CH2): First 5 digits of serial number 21121 or before), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module(R12CCPU-V Ethernet port (CH1, CH2): First 2 digits of serial number 11 or before, and RD55UP06-V Ethernet port: First 2 digits of serial number 08 or before), and MELIPC Series MI5000(MI5122-VW Ethernet port (CH1): First 2 digits of serial number 03 or before, or the firmware version 03 or before) allow remote attackers to cause a denial of service and/or malware being executed via unspecified vectors. Mitsubishi Electric MELSEC C Controller Module y MELIPC Series MI5000 MELSEC-Q Series C Controller Module (Q24DHCCPU-V, Q24DHCCPU-VG puerto User Ethernet (CH1, CH2): Primeros 5 dígitos del número de serial 21121 o anterior), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module (R12CCPU-V puerto Ethernet (CH1, CH2): Primeros 2 dígitos del número de serial 11 o anterior, y RD55UP06-V puerto Ethernet: Primeros 2 dígitos del número de serial 08 o anterior), y MELIPC Series MI5000 (MI5122-VW puerto Ethernet (CH1): Primeros 2 dígitos del número de serial 03 o anterior, o la versión de firmware 03 o anterior), permite a atacantes remotos causar una denegación de servicio (DoS) y/o un malware que se ejecuta por medio de vectores no especificados. • https://jvn.jp/en/vu/JVNVU95424547/index.html https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf •