Session Fixation Vulnerability in MELSEC iQ-R Series by Mitsubishi Electric
CVE-2020-5654
Key Information:
- Status
- Vendor
- CVE Published:
- 2 November 2020
Summary
A session fixation vulnerability exists in the TCP/IP function of the MELSEC iQ-R series firmware. This issue affects several modules, allowing remote unauthenticated attackers to disrupt network operations by sending specially crafted packets. As a result, compromised modules can cease network functionality, potentially impacting industrial control systems and operational efficiency. Users should review their firmware versions and apply necessary updates to mitigate this risk.
Affected Version(s)
MELSEC iQ-R series RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved