CVE-2020-5647
📋 TL;DR
This vulnerability allows remote unauthenticated attackers to send specially crafted packets to Mitsubishi GOT 1000 series GT14 model industrial HMIs, which can stop network functions or execute malicious programs. Affected systems include specific GT14 models with CoreOS version '05.65.00.BD' and earlier. This is a critical vulnerability affecting industrial control systems.
💻 Affected Systems
- Mitsubishi GOT 1000 series GT14 models: GT1455-QTBDE, GT1450-QMBDE, GT1450-QLBDE, GT1455HS-QTBDE, GT1450HS-QMBDE
📦 What is this software?
Coreos by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of industrial HMI allowing execution of arbitrary malicious programs, disruption of industrial processes, and potential physical damage or safety incidents.
Likely Case
Network functions disruption leading to operational downtime in industrial environments, with potential for malware deployment.
If Mitigated
Limited impact if systems are isolated behind firewalls with strict network segmentation and access controls.
🎯 Exploit Status
Remote unauthenticated exploitation via specially crafted packets. No authentication required. Likely weaponized given critical nature and industrial control system target.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: CoreOS version '05.65.00.BD' is vulnerable. Check Mitsubishi advisory for specific fixed versions.
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf
Restart Required: Yes
Instructions:
1. Download firmware update from Mitsubishi support portal. 2. Backup current configuration. 3. Apply firmware update following Mitsubishi's instructions. 4. Restart the GOT device. 5. Verify firmware version after update.
🔧 Temporary Workarounds
Network Segmentation and Firewall Rules
allIsolate GOT devices in separate network segments with strict firewall rules blocking unnecessary TCP/IP traffic.
Access Control Lists
allImplement network ACLs to restrict access to GOT devices only from authorized engineering workstations and controllers.
🧯 If You Can't Patch
- Implement strict network segmentation - isolate GOT devices in separate VLANs with firewall rules blocking all unnecessary traffic
- Deploy intrusion detection/prevention systems to monitor for anomalous TCP/IP traffic patterns to GOT devices
🔍 How to Verify
Check if Vulnerable:
Check CoreOS version on GOT device: Navigate to System Information in GOT menu and verify version is '05.65.00.BD' or earlier.
Check Version:
No CLI command - check via GOT device System Information menu interface
Verify Fix Applied:
After patching, verify CoreOS version shows updated version beyond '05.65.00.BD' in System Information.
📡 Detection & Monitoring
Log Indicators:
- Unusual TCP/IP connection attempts to GOT devices
- Network service disruptions on GOT devices
- Unexpected process execution on GOT devices
Network Indicators:
- Anomalous TCP packets to GOT device ports
- Traffic patterns matching known exploit signatures
- Unexpected network connections from GOT devices
SIEM Query:
source_ip=* AND dest_ip=GOT_IP AND (tcp_flags=malformed OR packet_size=anomalous)
🔗 References
- https://jvn.jp/vu/JVNVU99562395/index.html
- https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf
- https://jvn.jp/vu/JVNVU99562395/index.html
- https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf