Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2.

Project Subscriptions

Vendors Products
Mitsubishielectric Subscribe
R00cpu Firmware Subscribe
R01cpu Firmware Subscribe
R02cpu Firmware Subscribe
R04cpu Firmware Subscribe
R08cpu Firmware Subscribe
R08pcpu Subscribe
R08pcpu Firmware Subscribe
R08sfcpu Subscribe
R08sfcpu Firmware Subscribe
R120cpu Subscribe
R120cpu Firmware Subscribe
R120pcpu Subscribe
R120pcpu Firmware Subscribe
R120sfcpu Subscribe
R120sfcpu Firmware Subscribe
R16cpu Firmware Subscribe
R16mtcpu Subscribe
R16mtcpu Firmware Subscribe
R16pcpu Subscribe
R16pcpu Firmware Subscribe
R16sfcpu Subscribe
R16sfcpu Firmware Subscribe
R32cpu Firmware Subscribe
R32mtcpu Subscribe
R32mtcpu Firmware Subscribe
R32pcpu Subscribe
R32pcpu Firmware Subscribe
R32sfcpu Subscribe
R32sfcpu Firmware Subscribe
R64mtcpu Subscribe
R64mtcpu Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-8808 Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:45:33.224Z

Reserved: 2020-08-04T00:00:00

Link: CVE-2020-16850

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-30T22:15:10.840

Modified: 2024-11-21T05:07:16.033

Link: CVE-2020-16850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses