Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU94434051/index.html | Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02 | Third Party Advisory US Government Resource |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-019_en.pdf | Vendor Advisory |
https://jvn.jp/vu/JVNVU94434051/index.html | Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02 | Third Party Advisory US Government Resource |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-019_en.pdf | Vendor Advisory |
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
Configuration 23 (hide)
AND |
|
Configuration 24 (hide)
AND |
|
Configuration 25 (hide)
AND |
|
Configuration 26 (hide)
AND |
|
Configuration 27 (hide)
AND |
|
Configuration 28 (hide)
AND |
|
Configuration 29 (hide)
AND |
|
Configuration 30 (hide)
AND |
|
Configuration 31 (hide)
AND |
|
Configuration 32 (hide)
AND |
|
Configuration 33 (hide)
AND |
|
Configuration 34 (hide)
AND |
|
Configuration 35 (hide)
AND |
|
Configuration 36 (hide)
AND |
|
Configuration 37 (hide)
AND |
|
Configuration 38 (hide)
AND |
|
Configuration 39 (hide)
AND |
|
Configuration 40 (hide)
AND |
|
Configuration 41 (hide)
AND |
|
Configuration 42 (hide)
AND |
|
Configuration 43 (hide)
AND |
|
Configuration 44 (hide)
AND |
|
Configuration 45 (hide)
AND |
|
Configuration 46 (hide)
AND |
|
Configuration 47 (hide)
AND |
|
Configuration 48 (hide)
AND |
|
Configuration 49 (hide)
AND |
|
Configuration 50 (hide)
AND |
|
Configuration 51 (hide)
AND |
|
Configuration 52 (hide)
AND |
|
Configuration 53 (hide)
AND |
|
Configuration 54 (hide)
AND |
|
Configuration 55 (hide)
AND |
|
Configuration 56 (hide)
AND |
|
Configuration 57 (hide)
AND |
|
Configuration 58 (hide)
AND |
|
Configuration 59 (hide)
AND |
|
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/vu/JVNVU94434051/index.html - Third Party Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02 - Third Party Advisory, US Government Resource | |
References | () https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-019_en.pdf - Vendor Advisory |
24 Nov 2022, 06:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU Firmware versions "24" and prior, Mitsubishi Electric MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "57" and prior, Mitsubishi Electric MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions "28" and prior, Mitsubishi Electric MELSEC iQ-R Series R08/16/32/120PCPU Firmware versions "29" and prior, Mitsubishi Electric MELSEC iQ-R Series R08/16/32/120PSFCPU Firmware versions "08" and prior, Mitsubishi Electric MELSEC iQ-R Series R16/32/64MTCPU Operating system software version "23" and prior, Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V Firmware versions "16" and prior, Mitsubishi Electric MELSEC Q Series Q03UDECPU The first 5 digits of serial No. "23121" and prior, Mitsubishi Electric MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU The first 5 digits of serial No. "23121" and prior, Mitsubishi Electric MELSEC Q Series Q03/04/06/13/26UDVCPU The first 5 digits of serial No. "23071" and prior, Mitsubishi Electric MELSEC Q Series Q04/06/13/26UDPVCPU The first 5 digits of serial No. "23071" and prior, Mitsubishi Electric MELSEC Q Series Q12DCCPU-V The first 5 digits of serial No. "24031" and prior, Mitsubishi Electric MELSEC Q Series Q24DHCCPU-V(G) The first 5 digits of serial No. "24031" and prior, Mitsubishi Electric MELSEC Q Series Q24/26DHCCPU-LS The first 5 digits of serial No. "24031" and prior, Mitsubishi Electric MELSEC Q Series MR-MQ100 Operating system software version "F" and prior, Mitsubishi Electric MELSEC Q Series Q172/173DCPU-S1 Operating system software version "W" and prior, Mitsubishi Electric MELSEC Q Series Q172/173DSCPU All versions, Mitsubishi Electric MELSEC Q Series Q170MCPU Operating system software version "W" and prior, Mitsubishi Electric MELSEC Q Series Q170MSCPU(-S1) All versions, Mitsubishi Electric MELSEC L Series L02/06/26CPU(-P) The first 5 digits of serial No. "23121" and prior, Mitsubishi Electric MELSEC L Series L26CPU-(P)BT The first 5 digits of serial No. "23121" and prior and Mitsubishi Electric MELIPC Series MI5122-VW Firmware versions "05" and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery. |
26 Jul 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU Firmware versions "24" and prior, Mitsubishi Electric MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "57" and prior, Mitsubishi Electric MELSEC iQ-R Series R08/16/32/120SFCPU All versions, Mitsubishi Electric MELSEC iQ-R Series R08/16/32/120PCPU Firmware versions "29" and prior, Mitsubishi Electric MELSEC iQ-R Series R08/16/32/120PSFCPU Firmware versions "08" and prior, Mitsubishi Electric MELSEC iQ-R Series R16/32/64MTCPU Operating system software version "23" and prior, Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V Firmware versions "16" and prior, Mitsubishi Electric MELSEC Q Series Q03UDECPU The first 5 digits of serial No. "23121" and prior, Mitsubishi Electric MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU The first 5 digits of serial No. "23121" and prior, Mitsubishi Electric MELSEC Q Series Q03/04/06/13/26UDVCPU The first 5 digits of serial No. "23071" and prior, Mitsubishi Electric MELSEC Q Series Q04/06/13/26UDPVCPU The first 5 digits of serial No. "23071" and prior, Mitsubishi Electric MELSEC Q Series Q12DCCPU-V The first 5 digits of serial No. "24031" and prior, Mitsubishi Electric MELSEC Q Series Q24DHCCPU-V(G) The first 5 digits of serial No. "24031" and prior, Mitsubishi Electric MELSEC Q Series Q24/26DHCCPU-LS The first 5 digits of serial No. "24031" and prior, Mitsubishi Electric MELSEC Q Series MR-MQ100 Operating system software version "F" and prior, Mitsubishi Electric MELSEC Q Series Q172/173DCPU-S1 Operating system software version "W" and prior, Mitsubishi Electric MELSEC Q Series Q172/173DSCPU All versions, Mitsubishi Electric MELSEC Q Series Q170MCPU Operating system software version "W" and prior, Mitsubishi Electric MELSEC Q Series Q170MSCPU(-S1) All versions, Mitsubishi Electric MELSEC L Series L02/06/26CPU(-P) The first 5 digits of serial No. "23121" and prior, Mitsubishi Electric MELSEC L Series L26CPU-(P)BT The first 5 digits of serial No. "23121" and prior and Mitsubishi Electric MELIPC Series MI5122-VW Firmware versions "05" and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery. |
02 Jun 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Uncontrolled Resource Consumption vulnerability in MELSEC iQ-R Series R00/01/02CPU Firmware versions "24" and prior, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "57" and prior, MELSEC iQ-R Series R08/16/32/120SFCPU All versions, MELSEC iQ-R Series R08/16/32/120PCPU Firmware versions "29" and prior, MELSEC iQ-R Series R08/16/32/120PSFCPU Firmware versions "08" and prior, MELSEC iQ-R Series R16/32/64MTCPU Operating system software version "23" and prior, MELSEC iQ-R Series R12CCPU-V All versions, MELSEC Q Series Q03UDECPU The first 5 digits of serial No. "23121" and prior, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU The first 5 digits of serial No. "23121" and prior, MELSEC Q Series Q03/04/06/13/26UDVCPU The first 5 digits of serial No. "23071" and prior, MELSEC Q Series Q04/06/13/26UDPVCPU The first 5 digits of serial No. "23071" and prior, MELSEC Q Series Q12DCCPU-V The first 5 digits of serial No. "24031" and prior, MELSEC Q Series Q24DHCCPU-V(G) The first 5 digits of serial No. "24031" and prior, MELSEC Q Series Q24/26DHCCPU-LS The first 5 digits of serial No. "24031" and prior, MELSEC Q Series MR-MQ100 Operating system software version "F" and prior, MELSEC Q Series Q172/173DCPU-S1 Operating system software version "W" and prior, MELSEC Q Series Q172/173DSCPU All versions, MELSEC Q Series Q170MCPU Operating system software version "W" and prior, MELSEC Q Series Q170MSCPU(-S1) All versions, MELSEC L Series L02/06/26CPU(-P) The first 5 digits of serial No. "23121" and prior, MELSEC L Series L26CPU-(P)BT The first 5 digits of serial No. "23121" and prior and MELIPC Series MI5122-VW All versions allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery. |
26 Apr 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Uncontrolled Resource Consumption vulnerability in MELSEC iQ-R Series R00/01/02CPU Firmware versions "24" and prior, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "57" and prior, MELSEC iQ-R Series R08/16/32/120SFCPU All versions, MELSEC iQ-R Series R08/16/32/120PCPU Firmware versions "29" and prior, MELSEC iQ-R Series R08/16/32/120PSFCPU All versions, MELSEC iQ-R Series R16/32/64MTCPU All versions, MELSEC iQ-R Series R12CCPU-V All versions, MELSEC Q Series Q03UDECPU The first 5 digits of serial No. "23121" and prior, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU The first 5 digits of serial No. "23121" and prior, MELSEC Q Series Q03/04/06/13/26UDVCPU The first 5 digits of serial No. "23071" and prior, MELSEC Q Series Q04/06/13/26UDPVCPU The first 5 digits of serial No. "23071" and prior, MELSEC Q Series Q12DCCPU-V The first 5 digits of serial No. "24031" and prior, MELSEC Q Series Q24DHCCPU-V(G) The first 5 digits of serial No. "24031" and prior, MELSEC Q Series Q24/26DHCCPU-LS The first 5 digits of serial No. "24031" and prior, MELSEC Q Series MR-MQ100 Operating system software version "F" and prior, MELSEC Q Series Q172/173DCPU-S1 Operating system software version "W" and prior, MELSEC Q Series Q172/173DSCPU All versions, MELSEC Q Series Q170MCPU Operating system software version "W" and prior, MELSEC Q Series Q170MSCPU(-S1) All versions, MELSEC L Series L02/06/26CPU(-P) The first 5 digits of serial No. "23121" and prior, MELSEC L Series L26CPU-(P)BT The first 5 digits of serial No. "23121" and prior and MELIPC Series MI5122-VW All versions allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery. |
28 Jan 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Uncontrolled Resource Consumption vulnerability in MELSEC iQ-R Series R00/01/02CPU Firmware versions "24" and prior, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "57" and prior, MELSEC iQ-R Series R08/16/32/120SFCPU All versions, MELSEC iQ-R Series R08/16/32/120PCPU Firmware versions "29" and prior, MELSEC iQ-R Series R08/16/32/120PSFCPU All versions, MELSEC iQ-R Series R16/32/64MTCPU All versions, MELSEC iQ-R Series R12CCPU-V All versions, MELSEC Q Series Q03UDECPU The first 5 digits of serial No. "23121" and prior, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU The first 5 digits of serial No. "23121" and prior, MELSEC Q Series Q03/04/06/13/26UDVCPU The first 5 digits of serial No. "23071" and prior, MELSEC Q Series Q04/06/13/26UDPVCPU The first 5 digits of serial No. "23071" and prior, MELSEC Q Series Q12DCCPU-V All versions, MELSEC Q Series Q24DHCCPU-V(G) All versions, MELSEC Q Series Q24/26DHCCPU-LS All versions, MELSEC Q Series MR-MQ100 All versions, MELSEC Q Series Q172/173DCPU-S1 All versions, MELSEC Q Series Q172/173DSCPU All versions, MELSEC Q Series Q170MCPU All versions, MELSEC Q Series Q170MSCPU(-S1) All versions, MELSEC L Series L02/06/26CPU(-P) The first 5 digits of serial No. "23121" and prior, MELSEC L Series L26CPU-(P)BT The first 5 digits of serial No. "23121" and prior and MELIPC Series MI5122-VW All versions allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery. |
03 Dec 2021, 20:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:mitsubishi:melsec_l26cpu\(-p\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_l02cpu\(-p\):-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r32_mtcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r04_cpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r12_ccpu-v:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q26udvcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q173dcpu-s1:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q24dhccpu-ls_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r01_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q20udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r64_mtcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r16_sfcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r04_pcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r32_sfcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q26udecpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r32_pcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r120_pcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q170mscpu\(-s1\):-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r08_sfcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r16_cpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q13udvcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r04_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r32_pcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r32_mtcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q170mcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r08_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r120_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q26udpvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q06udvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r120_sfcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r32_cpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q26udpvcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_l26cpu-\(p\)bt:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q03udvcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q12dccpu-v:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r16_mtcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q13udpvcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q173dscpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q04udpvcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q06udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q03udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q172dscpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r120_sfcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_l06cpu\(-p\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q04udpvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r02_cpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q24dhccpu-ls:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_l06cpu\(-p\):-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q26udvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q170mscpu\(-s1\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r16_sfcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q13udecpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r02_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_mr-mq100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_l26cpu\(-p\):-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q100udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r00_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q24dhccpu-v\(g\):-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q12dccpu-v_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q13udvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_l02cpu\(-p\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q50udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r12_ccpu-v_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r16_pcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q13udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q06udpvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q100udecpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q26dhccpu-ls:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q50udecpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r120_pcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r04_pcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q06udpvcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q172dcpu-s1:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q04udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q173dcpu-s1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q04udvcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r08_sfcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q04udecpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q10udecpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q26dhccpu-ls_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q03udecpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q13udpvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q173dscpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r08_pcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r08_pcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q10udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r00_cpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q06udvcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melipc_mi5122-vw_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r32_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_l26cpu-\(p\)bt_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r16_mtcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q172dcpu-s1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melipc_mi5122-vw:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r120_cpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r01_cpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r16_pcpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q03udvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_iq-r_r16_cpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q06udecpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r32_sfcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q24dhccpu-v\(g\)_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_mr-mq100:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q172dscpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_iq-r_r64_mtcpu:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q170mcpu:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q04udvcpu_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishi:melsec_q26udecpu_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:mitsubishi:melsec_q20udecpu:-:*:*:*:*:*:*:* |
|
CWE | CWE-400 | |
References | (MISC) https://jvn.jp/vu/JVNVU94434051/index.html - Third Party Advisory | |
References | (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-334-02 - Third Party Advisory, US Government Resource | |
References | (MISC) https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-019_en.pdf - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.8
v3 : 7.5 |
01 Dec 2021, 16:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2021-12-01 16:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20609
Mitre link : CVE-2021-20609
CVE.ORG link : CVE-2021-20609
JSON object : View
mitsubishi
- melsec_iq-r_r16_cpu_firmware
- melsec_q26udecpu
- melsec_iq-r_r32_sfcpu_firmware
- melsec_q170mscpu\(-s1\)_firmware
- melsec_iq-r_r16_pcpu_firmware
- melsec_q04udvcpu
- melsec_iq-r_r120_cpu
- melsec_q13udvcpu_firmware
- melsec_q173dcpu-s1_firmware
- melsec_iq-r_r02_cpu
- melsec_iq-r_r32_mtcpu_firmware
- melsec_q26udpvcpu_firmware
- melsec_iq-r_r08_sfcpu
- melsec_q20udecpu_firmware
- melsec_iq-r_r120_sfcpu_firmware
- melsec_iq-r_r16_cpu
- melsec_q170mscpu\(-s1\)
- melsec_iq-r_r64_mtcpu
- melsec_q26dhccpu-ls_firmware
- melsec_q172dcpu-s1
- melsec_iq-r_r16_sfcpu
- melsec_iq-r_r00_cpu
- melsec_q06udvcpu_firmware
- melsec_iq-r_r12_ccpu-v
- melsec_iq-r_r120_sfcpu
- melsec_q172dscpu
- melipc_mi5122-vw
- melsec_q03udvcpu
- melsec_q06udvcpu
- melsec_iq-r_r16_sfcpu_firmware
- melsec_iq-r_r32_pcpu_firmware
- melsec_l26cpu\(-p\)
- melsec_q24dhccpu-v\(g\)_firmware
- melsec_q24dhccpu-ls
- melsec_q24dhccpu-ls_firmware
- melsec_iq-r_r08_cpu_firmware
- melsec_iq-r_r120_pcpu
- melsec_iq-r_r08_pcpu_firmware
- melsec_iq-r_r04_cpu_firmware
- melipc_mi5122-vw_firmware
- melsec_iq-r_r32_pcpu
- melsec_q06udecpu
- melsec_q173dcpu-s1
- melsec_q26udpvcpu
- melsec_q04udecpu_firmware
- melsec_iq-r_r16_mtcpu
- melsec_iq-r_r04_cpu
- melsec_iq-r_r120_pcpu_firmware
- melsec_q04udvcpu_firmware
- melsec_q12dccpu-v_firmware
- melsec_q100udecpu
- melsec_q50udecpu_firmware
- melsec_iq-r_r04_pcpu
- melsec_iq-r_r32_sfcpu
- melsec_q03udecpu_firmware
- melsec_mr-mq100_firmware
- melsec_iq-r_r16_mtcpu_firmware
- melsec_q10udecpu_firmware
- melsec_q13udvcpu
- melsec_q170mcpu
- melsec_q26udvcpu
- melsec_iq-r_r08_pcpu
- melsec_q170mcpu_firmware
- melsec_q172dcpu-s1_firmware
- melsec_q06udpvcpu
- melsec_q03udecpu
- melsec_q03udvcpu_firmware
- melsec_iq-r_r12_ccpu-v_firmware
- melsec_iq-r_r01_cpu_firmware
- melsec_l26cpu-\(p\)bt
- melsec_q10udecpu
- melsec_l06cpu\(-p\)
- melsec_q24dhccpu-v\(g\)
- melsec_l26cpu-\(p\)bt_firmware
- melsec_iq-r_r64_mtcpu_firmware
- melsec_q04udpvcpu_firmware
- melsec_q20udecpu
- melsec_q172dscpu_firmware
- melsec_q04udecpu
- melsec_l06cpu\(-p\)_firmware
- melsec_q12dccpu-v
- melsec_iq-r_r04_pcpu_firmware
- melsec_iq-r_r120_cpu_firmware
- melsec_iq-r_r00_cpu_firmware
- melsec_q26dhccpu-ls
- melsec_iq-r_r32_cpu
- melsec_iq-r_r08_cpu
- melsec_iq-r_r02_cpu_firmware
- melsec_q173dscpu_firmware
- melsec_mr-mq100
- melsec_q26udvcpu_firmware
- melsec_q13udecpu_firmware
- melsec_q13udpvcpu_firmware
- melsec_l02cpu\(-p\)
- melsec_q06udecpu_firmware
- melsec_q26udecpu_firmware
- melsec_l26cpu\(-p\)_firmware
- melsec_q04udpvcpu
- melsec_iq-r_r32_cpu_firmware
- melsec_q50udecpu
- melsec_l02cpu\(-p\)_firmware
- melsec_iq-r_r16_pcpu
- melsec_q06udpvcpu_firmware
- melsec_iq-r_r01_cpu
- melsec_iq-r_r08_sfcpu_firmware
- melsec_q173dscpu
- melsec_iq-r_r32_mtcpu
- melsec_q13udecpu
- melsec_q100udecpu_firmware
- melsec_q13udpvcpu
Uncontrolled Resource Consumption