Vulnerability Details : CVE-2020-14521
Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition.
Vulnerability category: Denial of service
Products affected by CVE-2020-14521
- cpe:2.3:a:mitsubishielectric:c_controller_module_setting_and_monitoring_tool:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*
- Mitsubishielectric » Gt Softgot1000Versions from including (>=) 3.0 and up to, including, (<=) 3.200jcpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*
- Mitsubishielectric » Gt Softgot2000Versions from including (>=) 1.0 and up to, including, (<=) 1.241bcpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:m_commdtm-io-link:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:melfa-works:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:melsec_wincpu_setting_utility:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:melsoft_em_software_development_kit:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:melsoft_navigator:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mt_works2:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:px_developer:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:rt_toolbox2:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:setting\/monitoring_tools_for_the_c_controller_module:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:slmp_data_collector:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:gt_designer3:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:melsoft_iq_appportal:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:motion_control_setting:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mr_configurator2:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:c_controller_interface_module_utility:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:cc-link_ie_control_network_data_collector:1.00a:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:cc-link_ie_field_network_data_collector:1.00a:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:cc-link_ie_tsn_data_collector:1.00a:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:gt_designer2_classic:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:melsoft_complete_clean_up_tool:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:motorizer:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mtconnect_data_collector:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mx_mesinterface:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mx_mesinterface-r:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mx_sheet:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:position_board_utility_2:*:*:*:*:*:*:*:*
- cpe:2.3:o:mitsubishielectric:network_interface_board_cc-link_ver.2_utility_firmware:*:*:*:*:*:*:*:*When used together with: Mitsubishielectric » Network Interface Board Cc-link Ver.2 Utility » Version: N/A
- cpe:2.3:o:mitsubishielectric:network_interface_board_cc_ie_control_utility_firmware:*:*:*:*:*:*:*:*When used together with: Mitsubishielectric » Network Interface Board Cc Ie Control Utility » Version: N/A
- cpe:2.3:o:mitsubishielectric:network_interface_board_cc_ie_field_utility_firmware:*:*:*:*:*:*:*:*When used together with: Mitsubishielectric » Network Interface Board Cc Ie Field Utility » Version: N/A
- cpe:2.3:o:mitsubishielectric:network_interface_board_mneth_utility_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-14521
1.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-14521
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
8.3
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
1.6
|
6.0
|
ICS-CERT | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2020-14521
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
-
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.Assigned by: ics-cert@hq.dhs.gov (Secondary)
References for CVE-2020-14521
-
https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-04
Mitsubishi Electric Factory Automation Engineering Products (Update F) | CISAThird Party Advisory;US Government Resource
-
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-007_en.pdf
Vendor Advisory
Jump to