CVE-2020-5644
📋 TL;DR
A buffer overflow vulnerability in the TCP/IP function of Mitsubishi Electric GOT 1000 series GT14 model firmware allows remote unauthenticated attackers to crash network functions or execute arbitrary code via specially crafted packets. This affects industrial control system operators using vulnerable versions of these human-machine interface (HMI) devices.
💻 Affected Systems
- GT1455-QTBDE
- GT1450-QMBDE
- GT1450-QLBDE
- GT1455HS-QTBDE
- GT1450HS-QMBDE
📦 What is this software?
Coreos by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, potential lateral movement within industrial networks, and disruption of industrial processes.
Likely Case
Denial of service causing network function disruption, potentially halting HMI operations and affecting connected industrial processes.
If Mitigated
Limited impact if devices are behind firewalls with strict network segmentation and packet filtering.
🎯 Exploit Status
Exploitation requires sending specially crafted TCP/IP packets to vulnerable devices.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: CoreOS version 05.66.00.BD and later
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf
Restart Required: Yes
Instructions:
1. Download updated firmware from Mitsubishi Electric support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify updated version.
🔧 Temporary Workarounds
Network Segmentation
allIsolate GOT devices in separate network segments with strict firewall rules.
Access Control Lists
allImplement ACLs to restrict TCP/IP access to trusted IP addresses only.
🧯 If You Can't Patch
- Implement strict network segmentation with industrial firewalls
- Deploy intrusion detection systems to monitor for exploit attempts
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via GOT maintenance utility or device settings menu.
Check Version:
Use GOT maintenance utility or check device settings for CoreOS version.
Verify Fix Applied:
Confirm firmware version is 05.66.00.BD or later using GOT maintenance utility.
📡 Detection & Monitoring
Log Indicators:
- Unexpected device restarts
- Network function failures
- Abnormal TCP/IP traffic patterns
Network Indicators:
- Malformed TCP/IP packets to GOT devices
- Unusual traffic to industrial control ports
SIEM Query:
source_ip=* AND dest_ip=[GOT_IP] AND (tcp_flags=malformed OR packet_size>normal)
🔗 References
- https://jvn.jp/vu/JVNVU99562395/index.html
- https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf
- https://jvn.jp/vu/JVNVU99562395/index.html
- https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf