Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00468.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Mitsubishielectric
Subscribe
|
Cr800-q
Subscribe
Cr800-q Firmware
Subscribe
Fx3g
Subscribe
Fx3g Firmware
Subscribe
Fx3gc
Subscribe
Fx3gc Firmware
Subscribe
Fx3s
Subscribe
Fx3s Firmware
Subscribe
Fx3u
Subscribe
Fx3u Firmware
Subscribe
Fx3uc
Subscribe
Fx3uc Firmware
Subscribe
Fx5u
Subscribe
Fx5u Firmware
Subscribe
Fx5uc
Subscribe
Fx5uc Firmware
Subscribe
Fx5uj
Subscribe
Fx5uj Firmware
Subscribe
L02cpu
Subscribe
L02cpu-p
Subscribe
L02cpu-p Firmware
Subscribe
L02cpu Firmware
Subscribe
L02scpu
Subscribe
L02scpu-p
Subscribe
L02scpu-p Firmware
Subscribe
L02scpu Firmware
Subscribe
L06cpu
Subscribe
L06cpu-p
Subscribe
L06cpu-p Firmware
Subscribe
L06cpu Firmware
Subscribe
L26cpu
Subscribe
L26cpu-bt
Subscribe
L26cpu-bt Firmware
Subscribe
L26cpu-p
Subscribe
L26cpu-p Firmware
Subscribe
L26cpu-pbt
Subscribe
L26cpu-pbt Firmware
Subscribe
L26cpu Firmware
Subscribe
Q02phcpu
Subscribe
Q02phcpu Firmware
Subscribe
Q06phcpu
Subscribe
Q06phcpu Firmware
Subscribe
Q12dccpu-v
Subscribe
Q12dccpu-v Firmware
Subscribe
Q12phcpu
Subscribe
Q12phcpu Firmware
Subscribe
Q12prhcpu
Subscribe
Q12prhcpu Firmware
Subscribe
Q172dscpu
Subscribe
Q172dscpu Firmware
Subscribe
Q173dscpu
Subscribe
Q173dscpu Firmware
Subscribe
Q173nccpu
Subscribe
Q173nccpu Firmware
Subscribe
Q24dhccpu-ls
Subscribe
Q24dhccpu-ls Firmware
Subscribe
Q24dhccpu-v
Subscribe
Q24dhccpu-v Firmware
Subscribe
Q24dhccpu-vg2
Subscribe
Q24dhccpu-vg2 Firmware
Subscribe
Q25phcpu
Subscribe
Q25phcpu Firmware
Subscribe
Q25prhcpu
Subscribe
Q25prhcpu Firmware
Subscribe
Q26dhccpu-ls
Subscribe
Q26dhccpu-ls Firmware
Subscribe
R00cpu
Subscribe
R00cpu Firmware
Subscribe
R01cpu
Subscribe
R01cpu Firmware
Subscribe
R02cpu
Subscribe
R02cpu Firmware
Subscribe
R04cpu
Subscribe
R04cpu Firmware
Subscribe
R04encpu
Subscribe
R04encpu Firmware
Subscribe
R08cpu
Subscribe
R08cpu Firmware
Subscribe
R08encpu
Subscribe
R08encpu Firmware
Subscribe
R120cpu
Subscribe
R120cpu Firmware
Subscribe
R120encpu
Subscribe
R120encpu Firmware
Subscribe
R16cpu
Subscribe
R16cpu Firmware
Subscribe
R16encpu
Subscribe
R16encpu Firmware
Subscribe
R32cpu
Subscribe
R32cpu Firmware
Subscribe
R32encpu
Subscribe
R32encpu Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
Configuration 39 [-]
| AND |
|
Configuration 40 [-]
| AND |
|
Configuration 41 [-]
| AND |
|
Configuration 42 [-]
| AND |
|
Configuration 43 [-]
| AND |
|
Configuration 44 [-]
| AND |
|
Configuration 45 [-]
| AND |
|
Configuration 46 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-26690 | When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-04T08:30:24.568Z
Reserved: 2020-01-06T00:00:00
Link: CVE-2020-5527
No data.
Status : Modified
Published: 2020-03-30T08:15:17.640
Modified: 2024-11-21T05:34:13.020
Link: CVE-2020-5527
No data.
OpenCVE Enrichment
No data.
EUVD