CVE-2020-5675
📋 TL;DR
An out-of-bounds read vulnerability in Mitsubishi Electric GOT2000/GS21 series GT21/GS21 models and Tension Controller LE7-40GU-L series allows remote attackers to cause denial-of-service conditions. By sending specially crafted packets, attackers can degrade communication performance or completely disrupt TCP communication functions. This affects industrial control systems using these specific human-machine interface (HMI) and controller products.
💻 Affected Systems
- GT2107-WTBD
- GT2107-WTSD
- GT2104-RTBD
- GT2104-PMBD
- GT2103-PMBD
- GS2110-WTBD
- GS2107-WTBD
- GS2110-WTBD-N
- GS2107-WTBD-N
- LE7-40GU-L with specific screen packages
📦 What is this software?
Gs2107 Wtbd Firmware by Mitsubishielectric
Gs2107 Wtbd N Firmware by Mitsubishielectric
Gs2110 Wtbd Firmware by Mitsubishielectric
Gs2110 Wtbd N Firmware by Mitsubishielectric
Gt2103 Pmbd Firmware by Mitsubishielectric
Gt2104 Pmbd Firmware by Mitsubishielectric
Gt2104 Rtbd Firmware by Mitsubishielectric
Gt2107 Wtbd Firmware by Mitsubishielectric
Gt2107 Wtsd Firmware by Mitsubishielectric
Le7 40gu L Firmware by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of TCP communication functions leading to operational downtime in industrial environments, potentially affecting production lines or critical processes.
Likely Case
Degraded communication performance causing intermittent connectivity issues and reduced system responsiveness in industrial control networks.
If Mitigated
Minimal impact if systems are isolated from untrusted networks and proper network segmentation is implemented.
🎯 Exploit Status
Exploitation requires sending specially crafted packets to vulnerable TCP services; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions newer than V01.39.000 for GT21/GS21 models; updated screen packages for LE7-40GU-L
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-017_en.pdf
Restart Required: Yes
Instructions:
1. Download updated firmware/screen packages from Mitsubishi Electric support. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify new version is running.
🔧 Temporary Workarounds
Network Segmentation
allIsolate vulnerable devices in separate network segments with strict firewall rules.
Access Control Lists
allImplement ACLs to restrict network access to vulnerable devices from trusted sources only.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable devices from untrusted networks
- Deploy intrusion detection/prevention systems to monitor for crafted packet patterns
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via device configuration interface or web interface; compare against affected versions list.
Check Version:
Device-specific; typically through device configuration menus or vendor software tools.
Verify Fix Applied:
Verify firmware version is newer than V01.39.000 for GT21/GS21 models; confirm updated screen packages for LE7-40GU-L.
📡 Detection & Monitoring
Log Indicators:
- Unexpected TCP connection resets
- Communication performance degradation logs
- Device restart events
Network Indicators:
- Unusual TCP packet patterns to industrial device ports
- Increased TCP retransmissions to affected devices
SIEM Query:
source_ip=* AND dest_port IN (industrial_ports) AND packet_size=unusual AND protocol=TCP
🔗 References
- https://jvn.jp/vu/JVNVU99277775/index.html
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-017.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-017_en.pdf
- https://jvn.jp/vu/JVNVU99277775/index.html
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-017.pdf
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-017_en.pdf