Lack of administrator control over security vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.14 and prior, FX3U-ENET-L Firmware version 1.14 and prior and FX3U-ENET-P502 Firmware version 1.14 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product or other unspecified effects by sending specially crafted packets to an unnecessary opening of TCP port. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU93268332/index.html | Third Party Advisory VDB Entry |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-013-01 | Third Party Advisory US Government Resource |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-023_en.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2022-01-14 12:15
Updated : 2022-01-21 10:11
NVD link : CVE-2021-20612
Mitre link : CVE-2021-20612
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
mitsubishielectric
- fx3u-enet_firmware
- fx3u-enet-p502
- fx3u-enet-p502_firmware
- fx3u-enet
- fx3u-enet-l_firmware
- fx3u-enet-l