CVE-2023-1424
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
24/05/2023
Last modified:
07/07/2023
Description
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\/ds_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\/ds:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\/dss_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\/dss:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\/es_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\/es:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mr\/ess_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mr\/ess:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\/ds_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mt\/ds:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\/dss_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mt\/dss:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\/es_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mitsubishielectric:melsec_iq-fx5u-32mt\/es:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:mitsubishielectric:melsec_iq-fx5u-32mt\/ess_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



