Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-04 | Third Party Advisory US Government Resource |
| https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-007_en.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-02-11 18:15
Updated : 2022-02-22 18:14
NVD link : CVE-2020-14521
Mitre link : CVE-2020-14521
JSON object : View
Products Affected
mitsubishielectric
- gx_works2
- cpu_module_logging_configuration_tool
- mr_configurator2
- gx_logviewer
- c_controller_interface_module_utility
- mx_mesinterface-r
- slmp_data_collector
- got1000
- fr_configurator2
- motion_control_setting
- melsoft_iq_appportal
- melsoft_navigator
- network_interface_board_mneth_utility
- gt_designer2_classic
- gt_softgot2000
- rt_toolbox2
- data_transfer
- mt_works2
- fr_configurator_sw3
- mtconnect_data_collector
- network_interface_board_cc_ie_field_utility
- mi_configurator
- m_commdtm-io-link
- network_interface_board_cc-link_ver.2_utility
- cc-link_ie_control_network_data_collector
- network_interface_board_cc_ie_control_utility
- px_developer
- rt_toolbox3
- c_controller_module_setting_and_monitoring_tool
- cc-link_ie_field_network_data_collector
- gx_developer
- melsoft_complete_clean_up_tool
- melsec_wincpu_setting_utility
- ezsocket
- gt_softgot1000
- cw_configurator
- position_board_utility_2
- mx_mesinterface
- mx_component
- setting\/monitoring_tools_for_the_c_controller_module
- got2000
- melfa-works
- motorizer
- cc-link_ie_tsn_data_collector
- mx_sheet
- gx_works3
- melsoft_em_software_development_kit
CWE
CWE-276
Incorrect Default Permissions
