Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-14523 : Security Advisory and Response

Learn about CVE-2020-14523, a high-severity vulnerability in Mitsubishi Electric Factory Automation products allowing arbitrary code execution. Find mitigation steps and affected versions.

Multiple Mitsubishi Electric Factory Automation products have a vulnerability that allows an attacker to execute arbitrary code.

Understanding CVE-2020-14523

This CVE involves a path traversal vulnerability in Mitsubishi Electric Factory Automation products.

What is CVE-2020-14523?

The CVE-2020-14523 vulnerability in Mitsubishi Electric Factory Automation products allows attackers to execute arbitrary code.

The Impact of CVE-2020-14523

The vulnerability has a CVSS base score of 8.3, indicating a high severity level with significant impacts on confidentiality, integrity, and availability.

Technical Details of CVE-2020-14523

This section provides detailed technical information about the CVE-2020-14523 vulnerability.

Vulnerability Description

The vulnerability is classified as CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').

Affected Systems and Versions

The following Mitsubishi Electric Factory Automation products are affected:

        CW Configurator: Version 1.010L and earlier
        FR Configurator2: Version 1.22Y and earlier
        GX Works2: Version 1.595V and earlier
        GX Works3: Version 1.063R and earlier
        MELSOFT iQ AppPortal: Version 1.17T and earlier
        MELSOFT Navigator: Version 2.70Y and earlier
        MI Configurator: All Versions
        MR Configurator2: Version 1.110Q and earlier
        MT Works2: Version 1.156N and earlier
        MX Component: Version 4.20W and earlier
        RT ToolBox3: Version 1.70Y and earlier
        MELSEC iQ-R Series Motion Module: Version 10 and earlier

Exploitation Mechanism

The vulnerability requires network access and user interaction, with no privileges required for exploitation.

Mitigation and Prevention

Effective mitigation strategies to address the CVE-2020-14523 vulnerability.

Immediate Steps to Take

        Apply security patches provided by Mitsubishi Electric.
        Implement network segmentation to limit exposure.
        Monitor network traffic for any suspicious activities.

Long-Term Security Practices

        Regularly update and patch all software and firmware.
        Conduct security assessments and penetration testing.
        Educate users and administrators on secure coding practices.

Patching and Updates

Ensure timely installation of security patches and updates from Mitsubishi Electric to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now