Command Injection Flaw in Mitsubishi MELSEC iQ-R Series Network Modules
CVE-2020-5657
Key Information:
- Status
- Vendor
- CVE Published:
- 2 November 2020
Summary
A command injection vulnerability exists in the TCP/IP functionality of Mitsubishi's MELSEC iQ-R series network modules. This flaw allows attackers on the adjacent network to disrupt network operations by sending specially crafted packets. The impacted modules include RJ71EIP91, RJ71PN92, RD81DL96, RD81MES96N, and RD81OPC96, particularly those with specific serial number limitations. This risk emphasizes the importance of securing network interfaces to prevent unauthorized access and maintain operational integrity.
Affected Version(s)
MELSEC iQ-R series RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved