Your review has been sent successfully

Mitsubishi Electric Update

2822
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

2 July, 2020

● High

2020-1429

Manufacturing - Other

Description:

Mitsubishi Electric has released a security update to address a vulnerability in the following products:

  • CPU Module Logging Configuration Tool, Versions 1.94Y and prior
  • CW Configurator, Versions 1.010L and prior
  • EM Software Development Kit (EM Configurator), Versions 1.010L and prior
  • GT Designer3(GOT2000), Versions 1.221F and prior
  • GX LogViewer, Versions 1.96A and prior
  • GX Works2, Versions 1.586L and prior
  • GX Works3, Versions 1.058L and prior
  • M_CommDTM-HART, Version 1.00A
  • M_CommDTM-IO-Link, Versions 1.02C and prior
  • MELFA-Works, Versions 4.3 and prior
  • MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool, Versions 1.004E and prior
  • MELSOFT FieldDeviceConfigurator, Versions 1.03D and prior
  • MELSOFT iQ AppPortal, Versions 1.11M and prior
  • MELSOFT Navigator, Versions 2.58L and prior
  • MI Configurator, Versions 1.003D and prior
  • Motion Control Setting, Versions 1.005F and prior
  • MR Configurator2, Versions 1.72A and prior
  • MT Works2, Versions 1.156N and prior
  • RT ToolBox2, Versions 3.72A and prior
  • RT ToolBox3, Versions 1.50C and prior

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Denial of service attack (DoS)

Best practice and Recommendations:

The CERT team encourages users to review Mitsubishi Electric security advisory and apply the necessary updates:

Last updated at 2 July, 2020

Rate the content

rate-icon
up icon