Mitsubishi Electric MELSEC iQ-R Series Cleartext Transmission of Sensitive Information (CVE-2021-20599)

high Tenable OT Security Plugin ID 500577

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Authorization bypass through user-controlled key vulnerability in MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU all versions and MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU all versions allows an remote unauthenticated attacker to login to a target CPU module by obtaining credentials other than password.

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Mitsubishi Electric has prepared the following countermeasures:

- MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU: Firmware versions "27" or later
- MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU: Firmware versions "12" or later

Customers using the affected products and versions may take measures through mitigations and workarounds. Mitsubishi Electric has released the fixed version as shown above, but updating the product to the fixed version is not available.
Mitsubishi Electric recommends users take the following mitigation measures to minimize risk associated with this vulnerability:

- Use a firewall or virtual private network (VPN) to prevent unauthorized access when Internet access is required.
- Use within a LAN and block access from untrusted networks and hosts through firewalls.
- Use the IP filter function to restrict the accessible IP addresses.

Please refer to the Mitsubishi Electric advisory for further details.

See Also

http://www.nessus.org/u?5d0579f8

https://jvn.jp/vu/JVNVU98578731

https://www.cisa.gov/news-events/ics-advisories/icsa-21-287-03

Plugin Details

Severity: High

ID: 500577

Version: 1.10

Type: remote

Family: Tenable.ot

Published: 2/7/2022

Updated: 4/23/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-20599

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:mitsubishielectric:r08sfcpu_firmware, cpe:/o:mitsubishielectric:r16sfcpu_firmware, cpe:/o:mitsubishielectric:r32sfcpu_firmware, cpe:/o:mitsubishielectric:r120sfcpu_firmware, cpe:/o:mitsubishielectric:r08psfcpu_firmware, cpe:/o:mitsubishielectric:r16psfcpu_firmware, cpe:/o:mitsubishielectric:r32psfcpu_firmware, cpe:/o:mitsubishielectric:r120psfcpu_firmware

Required KB Items: Tenable.ot/Mitsubishi

Exploit Ease: No known exploits are available

Patch Publication Date: 10/14/2021

Vulnerability Publication Date: 10/14/2021

Reference Information

CVE: CVE-2021-20599

CWE: 863