Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions "16" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number "24051" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions "05" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Mitsubishielectric
Subscribe
|
L02cpu
Subscribe
L02cpu-p
Subscribe
L02cpu-p Firmware
Subscribe
L02cpu Firmware
Subscribe
L02scpu
Subscribe
L02scpu-p
Subscribe
L02scpu-p Firmware
Subscribe
L02scpu Firmware
Subscribe
L06cpu
Subscribe
L06cpu-p
Subscribe
L06cpu-p Firmware
Subscribe
L06cpu Firmware
Subscribe
L26cpu
Subscribe
L26cpu-\(p\)bt
Subscribe
L26cpu-\(p\)bt Firmware
Subscribe
L26cpu-bt
Subscribe
L26cpu-bt-cm
Subscribe
L26cpu-bt-cm Firmware
Subscribe
L26cpu-bt Firmware
Subscribe
L26cpu-p
Subscribe
L26cpu-p Firmware
Subscribe
L26cpu-pbt
Subscribe
L26cpu-pbt Firmware
Subscribe
L26cpu Firmware
Subscribe
Q03udecpu
Subscribe
Q03udecpu Firmware
Subscribe
Q04udehcpu
Subscribe
Q04udehcpu Firmware
Subscribe
Q04udpvcpu
Subscribe
Q04udpvcpu Firmware
Subscribe
Q04udvcpu
Subscribe
Q04udvcpu Firmware
Subscribe
Q06ccpu-v
Subscribe
Q06ccpu-v Firmware
Subscribe
Q06phcpu
Subscribe
Q06phcpu Firmware
Subscribe
Q06udehcpu
Subscribe
Q06udehcpu Firmware
Subscribe
Q06udpvcpu
Subscribe
Q06udpvcpu Firmware
Subscribe
Q06udvcpu
Subscribe
Q06udvcpu Firmware
Subscribe
Q100udehcpu
Subscribe
Q100udehcpu Firmware
Subscribe
Q10udehcpu
Subscribe
Q10udehcpu Firmware
Subscribe
Q13udehcpu
Subscribe
Q13udehcpu Firmware
Subscribe
Q13udpvcpu
Subscribe
Q13udpvcpu Firmware
Subscribe
Q13udvcpu
Subscribe
Q13udvcpu Firmware
Subscribe
Q20udehcpu
Subscribe
Q20udehcpu Firmware
Subscribe
Q26dhccpu-ls
Subscribe
Q26dhccpu-ls Firmware
Subscribe
Q26udehcpu
Subscribe
Q26udehcpu Firmware
Subscribe
Q26udpvcpu
Subscribe
Q26udpvcpu Firmware
Subscribe
Q26udvcpu
Subscribe
Q26udvcpu Firmware
Subscribe
Q50udehcpu
Subscribe
Q50udehcpu Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-29701 | Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions "16" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number "24051" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions "05" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Mitsubishi
Published:
Updated: 2024-08-03T04:29:01.628Z
Reserved: 2022-02-10T00:00:00
Link: CVE-2022-24946
No data.
Status : Modified
Published: 2022-06-15T21:15:09.333
Modified: 2024-11-21T06:51:26.130
Link: CVE-2022-24946
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD