CVE-2020-5656
📋 TL;DR
This vulnerability allows remote unauthenticated attackers to send specially crafted packets to affected Mitsubishi Electric MELSEC iQ-R series modules, potentially stopping network functions or executing malicious programs. It affects specific serial number ranges of EtherNet/IP, PROFINET, Data Logger, MES Interface, and OPC UA Server modules. The CVSS 9.8 score indicates critical severity.
💻 Affected Systems
- MELSEC iQ-R RJ71EIP91 EtherNet/IP Network Interface Module
- MELSEC iQ-R RJ71PN92 PROFINET IO Controller Module
- MELSEC iQ-R RD81DL96 High Speed Data Logger Module
- MELSEC iQ-R RD81MES96N MES Interface Module
- MELSEC iQ-R RD81OPC96 OPC UA Server Module
📦 What is this software?
Melsec Iq Rd81dl96 Firmware by Mitsubishielectric
Melsec Iq Rd81mes96n Firmware by Mitsubishielectric
Melsec Iq Rd81opc96 Firmware by Mitsubishielectric
Melsec Iq Rj71eip91 Firmware by Mitsubishielectric
Melsec Iq Rj71pn92 Firmware by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of industrial control system operations through network function stoppage combined with arbitrary code execution leading to physical process manipulation or sabotage.
Likely Case
Denial of service affecting industrial automation processes, potentially causing production downtime in manufacturing environments.
If Mitigated
Limited impact if modules are behind firewalls with strict network segmentation and packet filtering.
🎯 Exploit Status
Special packet crafting required but no authentication needed. Industrial control system context may limit widespread exploitation tools.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Updated firmware versions specified in Mitsubishi Electric advisories
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-012_en.pdf
Restart Required: Yes
Instructions:
1. Identify affected modules by checking serial numbers. 2. Download updated firmware from Mitsubishi Electric support portal. 3. Follow module-specific firmware update procedures. 4. Verify serial numbers are outside vulnerable ranges after update.
🔧 Temporary Workarounds
Network Segmentation and Filtering
allIsolate affected modules in dedicated network segments with strict firewall rules to block unauthorized access.
Access Control Lists
allImplement network ACLs to restrict communication to only trusted IP addresses and required protocols.
🧯 If You Can't Patch
- Deploy industrial firewalls with deep packet inspection to detect and block malicious TCP/IP packets
- Implement network monitoring with anomaly detection for unusual traffic patterns to affected modules
🔍 How to Verify
Check if Vulnerable:
Check module serial numbers against vulnerable ranges: RJ71EIP91 (first 2 digits ≤ '02'), RJ71PN92 (first 2 digits ≤ '01'), RD81DL96 (first 2 digits ≤ '08'), RD81MES96N (first 2 digits ≤ '04'), RD81OPC96 (first 2 digits ≤ '04')
Check Version:
Check module configuration software or physical label for serial number and firmware version
Verify Fix Applied:
Verify serial number is outside vulnerable range and confirm firmware version matches patched versions in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unexpected module restarts
- Network service stoppage events
- Unusual packet patterns to module IPs
Network Indicators:
- Malformed TCP/IP packets to industrial control modules
- Traffic spikes followed by service disruption
SIEM Query:
source_ip NOT IN (trusted_ips) AND dest_port IN (industrial_ports) AND packet_size > threshold
🔗 References
- https://jvn.jp/vu/JVNVU92513419/index.html
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-012.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-012_en.pdf
- https://jvn.jp/vu/JVNVU92513419/index.html
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-012.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-012_en.pdf