Mitsubishi (CVE-2020-14521)

critical Tenable.ot Plugin ID 500618

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition. This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-04

http://www.nessus.org/u?3021dcde

Plugin Details

Severity: Critical

ID: 500618

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 3/21/2022

Updated: 3/21/2022

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-14521

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:mitsubishielectric:c_controller_interface_module_utility, cpe:/a:mitsubishielectric:c_controller_module_setting_and_monitoring_tool, cpe:/a:mitsubishielectric:cc-link_ie_control_network_data_collector:1.00a, cpe:/a:mitsubishielectric:cc-link_ie_field_network_data_collector:1.00a, cpe:/a:mitsubishielectric:cc-link_ie_tsn_data_collector:1.00a, cpe:/a:mitsubishielectric:cpu_module_logging_configuration_tool, cpe:/a:mitsubishielectric:cw_configurator, cpe:/a:mitsubishielectric:data_transfer, cpe:/a:mitsubishielectric:ezsocket, cpe:/a:mitsubishielectric:fr_configurator2, cpe:/a:mitsubishielectric:fr_configurator_sw3, cpe:/a:mitsubishielectric:gt_designer2_classic, cpe:/a:mitsubishielectric:gt_softgot1000, cpe:/a:mitsubishielectric:gt_softgot2000, cpe:/a:mitsubishielectric:gx_developer, cpe:/a:mitsubishielectric:gx_logviewer, cpe:/a:mitsubishielectric:gx_works2, cpe:/a:mitsubishielectric:gx_works3, cpe:/a:mitsubishielectric:m_commdtm-io-link, cpe:/a:mitsubishielectric:melfa-works, cpe:/a:mitsubishielectric:melsec_wincpu_setting_utility, cpe:/a:mitsubishielectric:melsoft_complete_clean_up_tool, cpe:/a:mitsubishielectric:melsoft_em_software_development_kit, cpe:/a:mitsubishielectric:melsoft_iq_appportal, cpe:/a:mitsubishielectric:melsoft_navigator, cpe:/a:mitsubishielectric:mi_configurator, cpe:/a:mitsubishielectric:motion_control_setting, cpe:/a:mitsubishielectric:motorizer, cpe:/a:mitsubishielectric:mr_configurator2, cpe:/a:mitsubishielectric:mt_works2, cpe:/a:mitsubishielectric:mtconnect_data_collector, cpe:/a:mitsubishielectric:mx_component, cpe:/a:mitsubishielectric:mx_mesinterface, cpe:/a:mitsubishielectric:mx_mesinterface-r, cpe:/a:mitsubishielectric:mx_sheet, cpe:/a:mitsubishielectric:position_board_utility_2, cpe:/a:mitsubishielectric:px_developer, cpe:/a:mitsubishielectric:rt_toolbox2, cpe:/a:mitsubishielectric:rt_toolbox3, cpe:/a:mitsubishielectric:setting%2fmonitoring_tools_for_the_c_controller_module, cpe:/a:mitsubishielectric:slmp_data_collector, cpe:/a:mitsubishielectric:gt_designer3, cpe:/o:mitsubishielectric:network_interface_board_cc-link_ver.2_utility_firmware, cpe:/o:mitsubishielectric:network_interface_board_cc_ie_control_utility_firmware, cpe:/o:mitsubishielectric:network_interface_board_cc_ie_field_utility_firmware, cpe:/o:mitsubishielectric:network_interface_board_mneth_utility_firmware

Required KB Items: Tenable.ot/Mitsubishi

Exploit Ease: No known exploits are available

Patch Publication Date: 2/11/2022

Vulnerability Publication Date: 2/11/2022

Reference Information

CVE: CVE-2020-14521

CWE: 276