Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version "05.65.00.BD" and earlier, GT1450-QMBDE CoreOS version "05.65.00.BD" and earlier, GT1450-QLBDE CoreOS version "05.65.00.BD" and earlier, GT1455HS-QTBDE CoreOS version "05.65.00.BD" and earlier, and GT1450HS-QMBDE CoreOS version "05.65.00.BD" and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
References
Link | Resource |
---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf | Vendor Advisory |
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02 | Third Party Advisory US Government Resource |
https://jvn.jp/vu/JVNVU99562395/index.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-11-05 19:15
Updated : 2020-11-20 09:33
NVD link : CVE-2020-5644
Mitre link : CVE-2020-5644
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
mitsubishielectric
- gt1455-qtbde
- coreos
- gt1450-qlbde
- gt1450hs-qmbde
- gt1450-qmbde
- gt1455hs-qtbde