CVE-2020-5644

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in the TCP/IP function of Mitsubishi Electric GOT 1000 series GT14 model firmware allows remote unauthenticated attackers to crash network functions or execute arbitrary code via specially crafted packets. This affects industrial control system operators using vulnerable versions of these human-machine interface (HMI) devices.

💻 Affected Systems

Products:
  • GT1455-QTBDE
  • GT1450-QMBDE
  • GT1450-QLBDE
  • GT1455HS-QTBDE
  • GT1450HS-QMBDE
Versions: CoreOS version 05.65.00.BD and earlier
Operating Systems: Mitsubishi Electric proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models with default TCP/IP configuration are vulnerable when network accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, potential lateral movement within industrial networks, and disruption of industrial processes.

🟠

Likely Case

Denial of service causing network function disruption, potentially halting HMI operations and affecting connected industrial processes.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and packet filtering.

🌐 Internet-Facing: HIGH - Directly exposed devices can be exploited by any internet-connected attacker without authentication.
🏢 Internal Only: HIGH - Internal attackers or malware can exploit this without authentication once inside the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted TCP/IP packets to vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CoreOS version 05.66.00.BD and later

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf

Restart Required: Yes

Instructions:

1. Download updated firmware from Mitsubishi Electric support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify updated version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate GOT devices in separate network segments with strict firewall rules.

Access Control Lists

all

Implement ACLs to restrict TCP/IP access to trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict network segmentation with industrial firewalls
  • Deploy intrusion detection systems to monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via GOT maintenance utility or device settings menu.

Check Version:

Use GOT maintenance utility or check device settings for CoreOS version.

Verify Fix Applied:

Confirm firmware version is 05.66.00.BD or later using GOT maintenance utility.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device restarts
  • Network function failures
  • Abnormal TCP/IP traffic patterns

Network Indicators:

  • Malformed TCP/IP packets to GOT devices
  • Unusual traffic to industrial control ports

SIEM Query:

source_ip=* AND dest_ip=[GOT_IP] AND (tcp_flags=malformed OR packet_size>normal)

🔗 References

📤 Share & Export