Unknown
CVE-2021-20609
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-20609
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU, MELSEC iQ-R Series R08/16/32/120SFCPU, MELSEC iQ-R Series R08/16/32/120PCPU, MELSEC iQ-R Series R08/16/32/120PSFCPU, MELSEC iQ-R Series R16/32/64MTCPU, MELSEC iQ-R Series R12CCPU-V, MELSEC Q Series Q03UDECPU, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU, MELSEC Q Series Q03/04/06/13/26UDVCPU, MELSEC Q Series Q04/06/13/26UDPVCPU, MELSEC Q Series Q12DCCPU-V, MELSEC Q Series Q24DHCCPU-V(G), MELSEC Q Series Q24/26DHCCPU-LS, MELSEC Q Series MR-MQ100, MELSEC Q Series Q172/173DCPU-S1, MELSEC Q Series Q172/173DSCPU, MELSEC Q Series Q170MCPU, MELSEC Q Series Q170MSCPU(-S1), MELSEC L Series L02/06/26CPU(-P), MELSEC L Series L26CPU-(P)BT and MELIPC Series MI5122-VW allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- melipc mi5122-vw firmware,
- melsec iq-r r00 cpu firmware,
- melsec iq-r r01 cpu firmware,
- melsec iq-r r02 cpu firmware,
- melsec iq-r r04 cpu firmware,
- melsec iq-r r04 pcpu firmware,
- melsec iq-r r08 cpu firmware,
- melsec iq-r r08 pcpu firmware,
- melsec iq-r r08 sfcpu firmware,
- melsec iq-r r12 ccpu-v firmware,
- melsec iq-r r120 cpu firmware,
- melsec iq-r r120 pcpu firmware,
- melsec iq-r r120 sfcpu firmware,
- melsec iq-r r16 cpu firmware,
- melsec iq-r r16 mtcpu firmware,
- melsec iq-r r16 pcpu firmware,
- melsec iq-r r16 sfcpu firmware,
- melsec iq-r r32 cpu firmware,
- melsec iq-r r32 mtcpu firmware,
- melsec iq-r r32 pcpu firmware,
- melsec iq-r r32 sfcpu firmware,
- melsec iq-r r64 mtcpu firmware,
- melsec l02cpu(-p) firmware,
- melsec l06cpu(-p) firmware,
- melsec l26cpu(-p) firmware,
- melsec l26cpu-(p)bt firmware,
- melsec mr-mq100 firmware,
- melsec q03udecpu firmware,
- melsec q03udvcpu firmware -,
- melsec q04udecpu firmware,
- melsec q04udpvcpu firmware -,
- melsec q04udvcpu firmware -,
- melsec q06udecpu firmware,
- melsec q06udpvcpu firmware -,
- melsec q06udvcpu firmware -,
- melsec q100udecpu firmware,
- melsec q10udecpu firmware,
- melsec q12dccpu-v firmware,
- melsec q13udecpu firmware,
- melsec q13udpvcpu firmware -,
- melsec q13udvcpu firmware -,
- melsec q170mcpu firmware,
- melsec q170mscpu(-s1) firmware,
- melsec q172dcpu-s1 firmware,
- melsec q172dscpu firmware,
- melsec q173dcpu-s1 firmware,
- melsec q173dscpu firmware -,
- melsec q20udecpu firmware,
- melsec q24dhccpu-ls firmware,
- melsec q24dhccpu-v(g) firmware,
- melsec q26dhccpu-ls firmware -,
- melsec q26udecpu firmware,
- melsec q26udpvcpu firmware -,
- melsec q26udvcpu firmware -,
- melsec q50udecpu firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: