Attacker Value
Unknown
0
CVE-2020-16226
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-16226
(Last updated February 22, 2025) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
QJ71MES96 all versions
QJ71WS96 all versions
Q06CCPU-V all versions
Q24DHCCPU-V all versions
Q24DHCCPU-VG all versions
R12CCPU-V all versions
RD55UP06-V, all versions
D55UP12-V all versions
RJ71GN11-T2 all versions
RJ71EN71 all versions
QJ71E71-100 all versions
LJ71E71-100 all versions
QJ71MT91 all versions
RD78Gn(n=4,8,16,32,64) all versions
RD78GHV all versions
RD78GHW all versions
NZ2GACP620-60 all versions
NZ2GACP620-300 all versions
NZ2FT-MT all versions
NZ2FT-EIP all versions
Q03UDECPU the first 5 digits of serial number 22081 and prior
QnUDEHCPU(n=04/06/10/13/20/26/50/100) the first 5 digits of serial number 22081 and prior
QnUDVCPU(n=03/04/06/13/26) the first 5 digits of serial number 22031 and prior
QnUDPVCPU(n=04/06/13/2) the first 5 digits of serial number 22031 and prior
LnCPU(-P)(n=02/06/26) the first 5 digits of serial number 22051 and prior
L26CPU-(P)BT the first 5 digits of serial number 22051 and prior
RnCPU(n=00/01/02) Version 18 and prior
RnCPU(n=04/08/16/32/120) Version 50 and prior
RnENCPU(n=04/08/16/32/120) Version 50 and prior
RnSFCPU (n=08/16/32/120) all versions
RnPCPU(n=08/16/32/120) all versions
RnPSFCPU(n=08/16/32/120) all versions
FX5U(C)-**M*/** Serial number 17X**** or later: Version 1.210 and prior
FX5U(C)-**M*/** Serial number 179**** and prior: Version 1.070 and prior
FX5UC-32M*/**-TS Version 1.210 and prior
FX5UJ-**M*/** Version 1.000
FX5-ENET all versions
FX5-ENET/IP all versions
FX3U-ENET-ADP all versions
FX3GE-**M*/** all versions
FX3U-ENET all versions
FX3U-ENET-L all versions
FX3U-ENET-P502 all versions
FX5-CCLGN-MS all versions
IU1-1M20-D all versions
LE7-40GU-L all versions
GOT2000 Series GT21 Model all versions
GS Series all versions
GOT1000 Series GT14 Model all versions
GT25-J71GN13-T2 all versions
FR-A800-E Series all versions
FR-F800-E Series all versions
FR-A8NCG Production date August 2020 and prior
FR-E800-EPA Series Production date July 2020 and prior
FR-E800-EPB Series Production date July 2020 and prior
Conveyor Tracking Application all versions
Conveyor Tracking Application all versions
Conveyor Tracking Application all versions
Conveyor Tracking Application all versions
MR-JE-C all versions
MR-J4-TM all versions
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- conveyor tracking application apr-ntr12fh -,
- conveyor tracking application apr-ntr20fh(n=1,2) -,
- conveyor tracking application apr-ntr3fh,
- conveyor tracking application apr-ntr6fh -,
- fr-a820-e firmware,
- fr-a840-e firmware,
- fr-a842-e firmware,
- fr-a860-e firmware,
- fr-a862-e firmware,
- fr-a8ncge firmware,
- fr-e800-epa firmware,
- fr-e800-epb firmware,
- fr-f820-e firmware,
- fr-f840-e firmware,
- fr-f842-e firmware,
- fr-f860-e firmware,
- fr-f862-e firmware,
- fx3g-14mr/ds firmware,
- fx3g-14mr/es firmware,
- fx3g-14mt/dss firmware,
- fx3g-14mt/ess firmware,
- fx3g-24mr/ds firmware,
- fx3g-24mr/es firmware,
- fx3g-24mt/dss firmware,
- fx3g-24mt/ess firmware,
- fx3g-32 mt/dss firmware,
- fx3g-40mr/ds firmware,
- fx3g-40mr/es firmware,
- fx3g-40mt/dss firmware,
- fx3g-40mt/ess firmware,
- fx3g-60mr/ds firmware,
- fx3g-60mr/es firmware,
- fx3g-60mt/dss firmware,
- fx3g-60mt/ess firmware,
- fx3u-enet firmware,
- fx3u-enet-l firmware,
- fx3u-enet-p502 firmware,
- fx5-cclgn-ms firmware,
- fx5-enet firmware,
- fx5-enet-adp firmware,
- fx5-enet/ip firmware,
- fx5uc-32mr/ds-ts firmware 1.210,
- fx5uc-32mt/d firmware 1.210,
- fx5uc-32mt/ds-ts firmware 1.210,
- fx5uc-32mt/dss firmware 1.210,
- fx5uc-32mt/dss-ts firmware 1.210,
- fx5uj-24mr/es firmware 1.000,
- fx5uj-24mt/es firmware 1.000,
- fx5uj-24mt/ess firmware 1.000,
- fx5uj-40mr/es firmware 1.000,
- fx5uj-40mt/es firmware 1.000,
- fx5uj-40mt/ess firmware 1.000,
- fx5uj-60mr/es firmware 1.000,
- fx5uj-60mt/es firmware 1.000,
- fx5uj-60mt/ess firmware 1.000,
- got simple series gs21 firmware,
- got1000 series gt14 firmware,
- got2000 series gt21 firmware,
- gt25-j71gn13-t2 firmware,
- iu1-1m20-d firmware,
- l26cpu-(p)bt firmware,
- le7-40gu-l firmware,
- lj71e71-100 firmware,
- lncpu(-p)(n=02/06/26) firmware,
- mr-j4-tm firmware,
- mr-je-c firmware,
- nz2ft-eip firmware,
- nz2ft-mt firmware,
- nz2gacp620-300 firmware,
- nz2gacp620-60 firmware,
- q03udecpu firmware,
- q06ccpu-v firmware,
- q24dhccpu-v firmware,
- q24dhccpu-vg firmware,
- qj71e71-100 firmware,
- qj71mes96 firmware,
- qj71mt91 firmware,
- qj71ws96 firmware,
- qnudehcpu(n=04/06/10/13/20/26/50/100) firmware,
- qnudpvcpu(n=04/06/13/2) firmware,
- qnudvcpu(n=03/04/06/13/26) firmware,
- r12ccpu-v firmware,
- rd55up06-v firmware,
- rd55up12-v firmware,
- rd78ghv firmware,
- rd78ghw firmware,
- rd78gn(n=4,8,16,32,64) firmware,
- rj71en71 firmware,
- rj71gn11-t2 firmware,
- rncpu(n=00/01/02)t firmware,
- rncpu(n=04/08/16/32/120) firmware,
- rnencpu(n=04/08/16/32/120) firmware,
- rnpcpu(n=08/16/32/120) firmware,
- rnpsfcpu(n=08/16/32/120) firmware,
- rnsfcpu (n=08/16/32/120) firmware
Weaknesses
References
Miscellaneous
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: