Your review has been sent successfully

Mitsubishi Electric Updates

1925
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

2 September, 2020

● High

2020-1711

All

Description:

Mitsubishi Electric has released security updates to address a vulnerability in the following products:

  • QJ71MES96, all versions
  • QJ71WS96, all versions
  • Q06CCPU-V, all versions
  • Q24DHCCPU-V, all versions
  • Q24DHCCPU-VG, all versions
  • R12CCPU-V, all versions
  • RD55UP06-V, all versions
  • RD55UP12-V, all versions
  • RJ71GN11-T2, all versions
  • RJ71EN71, all versions
  • QJ71E71-100, all versions
  • LJ71E71-100, all versions
  • QJ71MT91, all versions
  • RD78Gn(n=4,8,16,32,64), all versions
  • RD78GHV, all versions
  • RD78GHW, all versions
  • NZ2GACP620-60, all versions
  • NZ2GACP620-300, all versions
  • NZ2FT-MT, all versions
  • NZ2FT-EIP, all versions
  • Q03UDECPU, the first 5 digits of serial number 22081 and prior
  • QnUDEHCPU(n=04/06/10/13/20/26/50/100), the first 5 digits of serial number 22081 and prior
  • QnUDVCPU(n=03/04/06/13/26), the first 5 digits of serial number 22031 and prior
  • QnUDPVCPU(n=04/06/13/2), the first 5 digits of serial number 22031 and prior
  • LnCPU(-P)(n=02/06/26), the first 5 digits of serial number 22051 and prior
  • L26CPU-(P)BT, the first 5 digits of serial number 22051 and prior
  • RnCPU(n=00/01/02), Version 18 and prior
  • RnCPU(n=04/08/16/32/120), Version 50 and prior
  • RnENCPU(n=04/08/16/32/120), Version 50 and prior
  • RnSFCPU (n=08/16/32/120), all versions
  • RnPCPU(n=08/16/32/120), all versions
  • RnPSFCPU(n=08/16/32/120), all versions
  • FX5U(C)-**M*/**
    • Case1: Serial number 17X**** or later: Version 1.210 and prior
    • Case2: Serial number 179**** and prior: Version 1.070 and prior
  • FX5UC-32M*/**-TS, Version 1.210 and prior
  • FX5UJ-**M*/**, Version 1.000
  • FX5-ENET, all versions
  • FX5-ENET/IP, all versions
  • FX3U-ENET-ADP, all versions
  • FX3GE-**M*/**, all versions
  • FX3U-ENET, all versions
  • FX3U-ENET-L, all versions
  • FX3U-ENET-P502, all versions
  • FX5-CCLGN-MS, all versions
  • IU1-1M20-D, all versions
  • LE7-40GU-L, all versions
  • GOT2000 Series GT21 Model, all versions
  • GS Series, all versions
  • GOT1000 Series GT14 Model, all versions
  • GT25-J71GN13-T2, all versions
  • FR-A800-E Series, all versions
  • FR-F800-E Series, all versions
  • FR-A8NCG, Production date August 2020 and prior
  • FR-E800-EPA Series, Production date July 2020 and prior
  • FR-E800-EPB Series, Production date July 2020 and prior
  • Conveyor Tracking Application APR-nTR3FH, APR-nTR6FH, APR-nTR12FH, APR-nTR20FH(n=1,2), all versions (Discontinued product)
  • MR-JE-C, all versions
  • MR-J4-TM, all versions

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Denial of service attack (DoS)
  • Unauthorized disclosure of information
  • Unauthorized modification
  • Escalation of privilege
  • Execute arbitrary code

Best practice and Recommendations:

The CERT team encourages users to review Mitsubishi Electric security advisory and apply the necessary updates:

Last updated at 2 September, 2020

Rate the content

rate-icon
up icon