Number: AV20-319
Date: 2 September 2020
On 1 September 2020 ICS-CERT published an Advisory to highlight a vulnerability affecting the following Mitsubishi products:
- QJ71MES96 - all versions
- QJ71WS96 - all versions
- Q06CCPU-V - all versions
- Q24DHCCPU-V - all versions
- Q24DHCCPU-VG - all versions
- R12CCPU-V - all versions
- RD55UP06-V - all versions
- RD55UP12-V - all versions
- RJ71GN11-T2 - all versions
- RJ71EN71 - all versions
- QJ71E71-100 - all versions
- LJ71E71-100 - all versions
- QJ71MT91 - all versions
- RD78Gn(n=4,8,16,32,64) - all versions
- RD78GHV - all versions
- RD78GHW - all versions
- NZ2GACP620-60 - all versions
- NZ2GACP620-300 - all versions
- NZ2FT-MT - all versions
- NZ2FT-EIP - all versions
- Q03UDECPU - the first 5 digits of serial number 22081 and prior
- QnUDEHCPU(n=04/06/10/13/20/26/50/100) - the first 5 digits of serial number 22081 and prior
- QnUDVCPU(n=03/04/06/13/26) - the first 5 digits of serial number 22031 and prior
- QnUDPVCPU(n=04/06/13/2) - the first 5 digits of serial number 22031 and prior
- LnCPU(-P)(n=02/06/26) - the first 5 digits of serial number 22051 and prior
- L26CPU-(P)BT - the first 5 digits of serial number 22051 and prior
- RnCPU(n=00/01/02) - version 18 and prior
- RnCPU(n=04/08/16/32/120) - version 50 and prior
- RnENCPU(n=04/08/16/32/120) - version 50 and prior
- RnSFCPU (n=08/16/32/120) - all versions
- RnPCPU(n=08/16/32/120) - all versions
- RnPSFCPU(n=08/16/32/120) - all versions
- FX5U(C)-**M*/**
- Case1: Serial number 17X**** or later - version 1.210 and prior
- Case2: Serial number 179**** and prior - version 1.070 and prior
- FX5UC-32M*/**-TS - version 1.210 and prior
- FX5UJ-**M*/** - version 1.000
- FX5-ENET - all versions
- FX5-ENET/IP - all versions
- FX3U-ENET-ADP - all versions
- FX3GE-**M*/** - all versions
- FX3U-ENET - all versions
- FX3U-ENET-L - all versions
- FX3U-ENET-P502 - all versions
- FX5-CCLGN-MS - all versions
- IU1-1M20-D - all versions
- LE7-40GU-L - all versions
- GOT2000 Series GT21 Model - all versions
- GS Series - all versions
- GOT1000 Series GT14 Model - all versions
- GT25-J71GN13-T2 - all versions
- FR-A800-E Series - all versions
- FR-F800-E Series - all versions
- FR-A8NCG - production date August 2020 and prior
- FR-E800-EPA Series - production date July 2020 and prior
- FR-E800-EPB Series - production date July 2020 and prior
- Conveyor Tracking Application APR-nTR3FH, APR-nTR6FH, APR-nTR12FH, APR-nTR20FH(n=1,2) - all versions (Discontinued product)
- MR-JE-C - all versions
- MR-J4-TM - all versions
https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01
Exploitation of this vulnerability could allow a remote actor to hijack TCP sessions and execute arbitrary code.
The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary manufacturer updates.
Note to Readers
The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment. We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure , Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.