Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00303.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Mitsubishielectric
Subscribe
|
Melsec Iq-r00cpu
Subscribe
Melsec Iq-r00cpu Firmware
Subscribe
Melsec Iq-r01cpu
Subscribe
Melsec Iq-r01cpu Firmware
Subscribe
Melsec Iq-r02cpu
Subscribe
Melsec Iq-r02cpu Firmware
Subscribe
Melsec Iq-r04cpu
Subscribe
Melsec Iq-r04cpu Firmware
Subscribe
Melsec Iq-r08cpu
Subscribe
Melsec Iq-r08cpu Firmware
Subscribe
Melsec Iq-r08fcpu
Subscribe
Melsec Iq-r08fcpu Firmware
Subscribe
Melsec Iq-r08pcpu
Subscribe
Melsec Iq-r08pcpu Firmware
Subscribe
Melsec Iq-r08sfcpu
Subscribe
Melsec Iq-r08sfcpu Firmware
Subscribe
Melsec Iq-r120cpu
Subscribe
Melsec Iq-r120cpu Firmware
Subscribe
Melsec Iq-r120fcpu
Subscribe
Melsec Iq-r120fcpu Firmware
Subscribe
Melsec Iq-r120pcpu
Subscribe
Melsec Iq-r120pcpu Firmware
Subscribe
Melsec Iq-r120sfcpu
Subscribe
Melsec Iq-r120sfcpu Firmware
Subscribe
Melsec Iq-r16cpu
Subscribe
Melsec Iq-r16cpu Firmware
Subscribe
Melsec Iq-r16fcpu
Subscribe
Melsec Iq-r16fcpu Firmware
Subscribe
Melsec Iq-r16pcpu
Subscribe
Melsec Iq-r16pcpu Firmware
Subscribe
Melsec Iq-r16sfcpu
Subscribe
Melsec Iq-r16sfcpu Firmware
Subscribe
Melsec Iq-r32cpu
Subscribe
Melsec Iq-r32cpu Firmware
Subscribe
Melsec Iq-r32fcpu
Subscribe
Melsec Iq-r32fcpu Firmware
Subscribe
Melsec Iq-r32pcpu
Subscribe
Melsec Iq-r32pcpu Firmware
Subscribe
Melsec Iq-r32sfcpu
Subscribe
Melsec Iq-r32sfcpu Firmware
Subscribe
Melsec Iq-rj71en71
Subscribe
Melsec Iq-rj71en71 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-5507 | Mitsubishi MELSEC iQ-R Series PLCs with firmware 33 allow attackers to halt the industrial process by sending an unauthenticated crafted packet over the network, because this denial of service attack consumes excessive CPU time. After halting, physical access to the PLC is required in order to restore production. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:11:19.452Z
Reserved: 2020-05-20T00:00:00
Link: CVE-2020-13238
No data.
Status : Modified
Published: 2020-06-10T20:15:14.140
Modified: 2024-11-21T05:00:51.327
Link: CVE-2020-13238
No data.
OpenCVE Enrichment
No data.
EUVD