[Control systems] Mitsubishi Electric security advisory

Number: AV20-233
Date: 2 July 2020

On 30 June 2020 US-CERT published an advisory to highlight two vulnerabilities in several of Mitsubishi Factory Automation Engineering Software Products:

  • CPU Module Logging Configuration Tool, Versions 1.94Y and prior
  • CW Configurator, Versions 1.010L and prior
  • EM Software Development Kit (EM Configurator), Versions 1.010L and prior
  • GT Designer3 (GOT2000), Versions 1.221F and prior
  • GX LogViewer, Versions 1.96A and prior
  • GX Works2, Versions 1.586L and prior
  • GX Works3, Versions 1.058L and prior
  • M_CommDTM-HART, Version 1.00A
  • M_CommDTM-IO-Link, Versions 1.02C and prior
  • MELFA-Works, Versions 4.3 and prior
  • MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool, Versions 1.004E and prior
  • MELSOFT FieldDeviceConfigurator, Versions 1.03D and prior
  • MELSOFT iQ AppPortal, Versions 1.11M and prior
  • MELSOFT Navigator, Versions 2.58L and prior
  • MI Configurator, Versions 1.003D and prior
  • Motion Control Setting, Versions 1.005F and prior
  • MR Configurator2, Versions 1.72A and prior
  • MT Works2, Versions 1.156N and prior
  • RT ToolBox2, Versions 3.72A and prior
  • RT ToolBox3, Versions 1.50C and prior

Successful exploitation of this vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. could allow exfiltration ExfiltrationThe unauthorized removal of data or files from a system by an intruder. of system files or a denial-of-service condition.

The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary manufacturer updates.
https://www.us-cert.gov/ics/advisories/icsa-20-182-02
 
Note to Readers
The Canadian Centre for Cyber Security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure Critical infrastructureProcesses, systems, facilities, technologies, networks, assets, and services essential to the health, safety, security, or economic well-being of Canadians and the effective functioning of government. Critical infrastructure can be stand-alone or interconnected and interdependent within and across provinces, territories, and national borders. Disruptions of critical infrastructure could result in catastrophic loss of life, adverse economic effects, and significant harm to public confidence. , Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Date modified: