CVE-2020-5594
📋 TL;DR
CVE-2020-5594 is a vulnerability in Mitsubishi Electric PLC CPU modules that transmits sensitive information in cleartext between CPU modules and engineering software (GX Works2/3). This allows attackers on the same network to intercept credentials, configuration data, and control commands. All users of affected Mitsubishi Electric MELSEC PLC series are impacted.
💻 Affected Systems
- Mitsubishi Electric MELSEC iQ-R series CPU modules
- Mitsubishi Electric MELSEC iQ-F series CPU modules
- Mitsubishi Electric MELSEC Q series CPU modules
- Mitsubishi Electric MELSEC L series CPU modules
- Mitsubishi Electric MELSEC FX series CPU modules
📦 What is this software?
Melsec Fx Firmware by Mitsubishielectric
Melsec Iq F Firmware by Mitsubishielectric
Melsec Iq R Firmware by Mitsubishielectric
Melsec L Firmware by Mitsubishielectric
Melsec Q Firmware by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of industrial control systems allowing attackers to intercept credentials, modify PLC logic, disrupt operations, or cause physical damage to equipment.
Likely Case
Unauthorized access to sensitive configuration data, program logic theft, and potential manipulation of industrial processes.
If Mitigated
Limited to network reconnaissance and information gathering if proper network segmentation and encryption are implemented.
🎯 Exploit Status
Exploitation requires network access to the communication channel between PLC and engineering workstation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: GX Works3 Version 1.095R or later, GX Works2 Version 1.611R or later
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-003_en.pdf
Restart Required: Yes
Instructions:
1. Update GX Works3 to Version 1.095R or later. 2. Update GX Works2 to Version 1.611R or later. 3. Restart engineering workstations. 4. Verify communication uses encrypted channels.
🔧 Temporary Workarounds
Network Segmentation
allIsolate PLC networks from other networks using firewalls and VLANs
Encrypted VPN Tunnel
allEstablish encrypted VPN tunnels between engineering stations and PLCs
🧯 If You Can't Patch
- Implement strict network segmentation to isolate PLC communication channels
- Use encrypted communication protocols or VPNs for all PLC engineering access
🔍 How to Verify
Check if Vulnerable:
Check if using affected Mitsubishi PLCs with GX Works2/3 versions below the patched versions
Check Version:
In GX Works: Help → About GX Works
Verify Fix Applied:
Verify GX Works3 is Version 1.095R or later and GX Works2 is Version 1.611R or later
📡 Detection & Monitoring
Log Indicators:
- Unusual network traffic patterns between engineering stations and PLCs
- Multiple failed connection attempts to PLC ports
Network Indicators:
- Cleartext traffic on PLC communication ports (typically 5006/UDP, 5007/TCP)
- Unencrypted MELSEC protocol traffic
SIEM Query:
source_ip IN (engineering_stations) AND dest_ip IN (plc_ips) AND protocol IN (tcp, udp) AND dest_port IN (5006, 5007) AND NOT encrypted=true
🔗 References
- https://jvn.jp/en/vu/JVNVU91424496/index.html
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-003.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-003_en.pdf
- https://jvn.jp/en/vu/JVNVU91424496/index.html
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-003.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-003_en.pdf