Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Mitsubishielectric
Subscribe
|
R00cpu
Subscribe
R00cpu Firmware
Subscribe
R01cpu
Subscribe
R01cpu Firmware
Subscribe
R02cpu
Subscribe
R02cpu Firmware
Subscribe
R04cpu
Subscribe
R04cpu Firmware
Subscribe
R08cpu
Subscribe
R08cpu Firmware
Subscribe
R08pcpu
Subscribe
R08pcpu Firmware
Subscribe
R08sfcpu
Subscribe
R08sfcpu Firmware
Subscribe
R120cpu
Subscribe
R120cpu Firmware
Subscribe
R120pcpu
Subscribe
R120pcpu Firmware
Subscribe
R120sfcpu
Subscribe
R120sfcpu Firmware
Subscribe
R16cpu
Subscribe
R16cpu Firmware
Subscribe
R16mtcpu
Subscribe
R16mtcpu Firmware
Subscribe
R16pcpu
Subscribe
R16pcpu Firmware
Subscribe
R16sfcpu
Subscribe
R16sfcpu Firmware
Subscribe
R32cpu
Subscribe
R32cpu Firmware
Subscribe
R32mtcpu
Subscribe
R32mtcpu Firmware
Subscribe
R32pcpu
Subscribe
R32pcpu Firmware
Subscribe
R32sfcpu
Subscribe
R32sfcpu Firmware
Subscribe
R64mtcpu
Subscribe
R64mtcpu Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-8808 | Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:45:33.224Z
Reserved: 2020-08-04T00:00:00
Link: CVE-2020-16850
No data.
Status : Modified
Published: 2020-11-30T22:15:10.840
Modified: 2024-11-21T05:07:16.033
Link: CVE-2020-16850
No data.
OpenCVE Enrichment
No data.
EUVD