CVE-2020-5666
Severity CVSS v4.0:
Pending analysis
Type:
CWE-400
Uncontrolled Resource Consumption ('Resource Exhaustion')
Publication date:
16/11/2020
Last modified:
03/12/2020
Description
Uncontrolled resource consumption vulnerability in MELSEC iQ-R Series CPU Modules (R00/01/02CPU Firmware versions from '05' to '19' and R04/08/16/32/120(EN)CPU Firmware versions from '35' to '51') allows a remote attacker to cause an error in a CPU unit via a specially crafted HTTP packet, which may lead to a denial-of-service (DoS) condition in execution of the program and its communication.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:mitsubishielectric:melsec_iq-r00_firmware:*:*:*:*:*:*:*:* | 05 (including) | 19 (including) |
| cpe:2.3:h:mitsubishielectric:melsec_iq-r00:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-r01_firmware:*:*:*:*:*:*:*:* | 05 (including) | 19 (including) |
| cpe:2.3:h:mitsubishielectric:melsec_iq-r01:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-r02_firmware:*:*:*:*:*:*:*:* | 05 (including) | 19 (including) |
| cpe:2.3:h:mitsubishielectric:melsec_iq-r02:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-r04_firmware:*:*:*:*:*:*:*:* | 35 (including) | 51 (including) |
| cpe:2.3:h:mitsubishielectric:melsec_iq-r04:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-r16_firmware:*:*:*:*:*:*:*:* | 35 (including) | 51 (including) |
| cpe:2.3:h:mitsubishielectric:melsec_iq-r16:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-r08_firmware:*:*:*:*:*:*:*:* | 35 (including) | 51 (including) |
| cpe:2.3:h:mitsubishielectric:melsec_iq-r08:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-r32_firmware:*:*:*:*:*:*:*:* | 35 (including) | 51 (including) |
| cpe:2.3:h:mitsubishielectric:melsec_iq-r32:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-r120_firmware:*:*:*:*:*:*:*:* | 35 (including) | 51 (including) |
To consult the complete list of CPE names with products and versions, see this page



