Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-5603 : Security Advisory and Response

Learn about CVE-2020-5603, a vulnerability in Mitsubishi Electric FA Engineering Software leading to denial of service attacks. Find mitigation steps and affected systems here.

A vulnerability in Mitsubishi Electric FA Engineering Software could lead to denial of service attacks due to uncontrolled resource consumption.

Understanding CVE-2020-5603

This CVE identifies a specific vulnerability in Mitsubishi Electric FA Engineering Software that could be exploited by attackers to cause a denial of service condition.

What is CVE-2020-5603?

The CVE-2020-5603 vulnerability involves uncontrolled resource consumption in various versions of Mitsubishi Electric FA Engineering Software, potentially allowing attackers to launch denial of service attacks through unspecified vectors.

The Impact of CVE-2020-5603

The vulnerability could result in a denial of service (DoS) condition, impacting the availability and functionality of the affected systems.

Technical Details of CVE-2020-5603

This section provides more technical insights into the CVE-2020-5603 vulnerability.

Vulnerability Description

The uncontrolled resource consumption vulnerability in Mitsubishi Electric FA Engineering Software affects multiple versions of various tools within the software suite.

Affected Systems and Versions

The following systems and versions are impacted by CVE-2020-5603:

        CPU Module Logging Configuration Tool Ver. 1.94Y and earlier
        CW Configurator Ver. 1.010L and earlier
        EM Software Development Kit (EM Configurator) Ver. 1.010L and earlier
        GT Designer3 (GOT2000) Ver. 1.221F and earlier
        GX LogViewer Ver. 1.96A and earlier
        GX Works2 Ver. 1.586L and earlier
        GX Works3 Ver. 1.058L and earlier
        M_CommDTM-HART Ver. 1.00A
        M_CommDTM-IO-Link Ver. 1.02C and earlier
        MELFA-Works Ver. 4.3 and earlier
        MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool Ver.1.004E and earlier
        MELSOFT FieldDeviceConfigurator Ver. 1.03D and earlier
        MELSOFT iQ AppPortal Ver. 1.11M and earlier
        MELSOFT Navigator Ver. 2.58L and earlier
        MI Configurator Ver. 1.003D and earlier
        Motion Control Setting Ver. 1.005F and earlier
        MR Configurator2 Ver. 1.72A and earlier
        MT Works2 Ver. 1.156N and earlier
        RT ToolBox2 Ver. 3.72A and earlier
        RT ToolBox3 Ver. 1.50C and earlier

Exploitation Mechanism

The vulnerability can be exploited by attackers through unspecified vectors, leading to uncontrolled resource consumption and subsequent denial of service attacks.

Mitigation and Prevention

To address CVE-2020-5603, the following steps are recommended:

Immediate Steps to Take

        Implement network segmentation to limit the impact of potential attacks.
        Monitor network traffic for any suspicious activity.
        Apply vendor-supplied patches or updates promptly.

Long-Term Security Practices

        Regularly update and patch all software and systems to mitigate known vulnerabilities.
        Conduct regular security assessments and penetration testing to identify and address potential weaknesses.

Patching and Updates

        Stay informed about security advisories and updates from Mitsubishi Electric Corporation.
        Apply patches and updates provided by the vendor to address the CVE-2020-5603 vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now