// For flags

CVE-2021-20612

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Lack of administrator control over security vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.14 and prior, FX3U-ENET-L Firmware version 1.14 and prior and FX3U-ENET-P502 Firmware version 1.14 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product or other unspecified effects by sending specially crafted packets to an unnecessary opening of TCP port. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery.

Una falta de control del administrador sobre la vulnerabilidad de seguridad en la serie MELSEC-F FX3U-ENET Firmware versión 1.14 y anteriores, FX3U-ENET-L Firmware versión 1.14 y anteriores y FX3U-ENET-P502 Firmware versión 1.14 y anteriores permite que un atacante remoto no autenticado cause una condición de denegación de servicio (DoS) en la función de comunicación del producto u otros efectos no especificados mediante el envío de paquetes especialmente diseñados a una apertura no necesaria del puerto TCP. El control por parte del PLC de la serie MELSEC-F no está afectado por esta vulnerabilidad, pero es necesario reiniciar el sistema para recuperarlo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-17 CVE Reserved
  • 2022-01-14 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-09-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mitsubishielectric
Search vendor "Mitsubishielectric"
Fx3u-enet Firmware
Search vendor "Mitsubishielectric" for product "Fx3u-enet Firmware"
<= 1.14
Search vendor "Mitsubishielectric" for product "Fx3u-enet Firmware" and version " <= 1.14"
-
Affected
in Mitsubishielectric
Search vendor "Mitsubishielectric"
Fx3u-enet
Search vendor "Mitsubishielectric" for product "Fx3u-enet"
--
Safe
Mitsubishielectric
Search vendor "Mitsubishielectric"
Fx3u-enet-l Firmware
Search vendor "Mitsubishielectric" for product "Fx3u-enet-l Firmware"
<= 1.14
Search vendor "Mitsubishielectric" for product "Fx3u-enet-l Firmware" and version " <= 1.14"
-
Affected
in Mitsubishielectric
Search vendor "Mitsubishielectric"
Fx3u-enet-l
Search vendor "Mitsubishielectric" for product "Fx3u-enet-l"
--
Safe
Mitsubishielectric
Search vendor "Mitsubishielectric"
Fx3u-enet-p502 Firmware
Search vendor "Mitsubishielectric" for product "Fx3u-enet-p502 Firmware"
<= 1.14
Search vendor "Mitsubishielectric" for product "Fx3u-enet-p502 Firmware" and version " <= 1.14"
-
Affected
in Mitsubishielectric
Search vendor "Mitsubishielectric"
Fx3u-enet-p502
Search vendor "Mitsubishielectric" for product "Fx3u-enet-p502"
--
Safe