CVE-2020-5653

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in the TCP/IP function of Mitsubishi Electric MELSEC iQ-R series modules allows remote unauthenticated attackers to crash network functions or execute arbitrary code via specially crafted packets. This affects specific industrial control system modules with vulnerable firmware versions. The CVSS 9.8 score indicates critical severity.

💻 Affected Systems

Products:
  • MELSEC iQ-R RJ71EIP91 EtherNet/IP Network Interface Module
  • MELSEC iQ-R RJ71PN92 PROFINET IO Controller Module
  • MELSEC iQ-R RD81DL96 High Speed Data Logger Module
  • MELSEC iQ-R RD81MES96N MES Interface Module
  • MELSEC iQ-R RD81OPC96 OPC UA Server Module
Versions: Firmware with serial numbers: RJ71EIP91 (first 2 digits '02' or before), RJ71PN92 (first 2 digits '01' or before), RD81DL96 (first 2 digits '08' or before), RD81MES96N (first 2 digits '04' or before), RD81OPC96 (first 2 digits '04' or before)
Operating Systems: Embedded firmware on industrial control modules
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in TCP/IP stack implementation; all default configurations of affected modules are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, disruption of industrial processes, and potential physical damage or safety incidents.

🟠

Likely Case

Denial of service causing network function stoppage and disruption of industrial operations.

🟢

If Mitigated

Limited impact if modules are isolated in protected networks with proper segmentation and monitoring.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible from internet if exposed.
🏢 Internal Only: HIGH - Even internally, unauthenticated network access allows exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Remote unauthenticated buffer overflow via crafted packets.

No public exploit code found in references, but vulnerability details are public and exploitation appears straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated firmware versions specified in vendor advisories

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-012_en.pdf

Restart Required: Yes

Instructions:

1. Identify affected modules using serial numbers. 2. Download updated firmware from Mitsubishi Electric support. 3. Follow vendor instructions to update firmware on each module. 4. Verify serial numbers are no longer in vulnerable ranges.

🔧 Temporary Workarounds

Network segmentation and isolation

all

Isolate affected modules in separate network segments with strict firewall rules to prevent unauthorized access.

Access control restrictions

all

Implement network access controls to limit which systems can communicate with vulnerable modules.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable modules from untrusted networks.
  • Deploy intrusion detection systems to monitor for anomalous network traffic targeting these modules.

🔍 How to Verify

Check if Vulnerable:

Check serial numbers on affected modules: RJ71EIP91 (first 2 digits '02' or before), RJ71PN92 (first 2 digits '01' or before), RD81DL96 (first 2 digits '08' or before), RD81MES96N (first 2 digits '04' or before), RD81OPC96 (first 2 digits '04' or before).

Check Version:

Check module firmware version via Mitsubishi Electric configuration tools (specific commands vary by module).

Verify Fix Applied:

Verify serial numbers are updated beyond vulnerable ranges after firmware update.

📡 Detection & Monitoring

Log Indicators:

  • Module crash logs
  • Network function stoppage events
  • Unexpected module restarts

Network Indicators:

  • Unusual TCP/IP traffic patterns to module ports
  • Crafted packets targeting module network services

SIEM Query:

Search for network traffic to industrial control modules with payload patterns matching buffer overflow attempts.

🔗 References

📤 Share & Export