CVE-2021-20590

7.5 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to bypass authentication in Mitsubishi Electric GOT2000 and GOT SIMPLE series HMI VNC servers. Attackers can gain unauthorized access by sending specially crafted packets when the VNC server function is enabled. Affected systems include specific models of GOT2000 and GOT SIMPLE series industrial HMIs.

💻 Affected Systems

Products:
  • GOT2000 series GT27 model
  • GOT2000 series GT25 model
  • GOT2000 series GT21 model GT2107-WTBD
  • GOT2000 series GT21 model GT2107-WTSD
  • GOT SIMPLE series GS21 model GS2110-WTBD-N
  • GOT SIMPLE series GS21 model GS2107-WTBD-N
Versions: GT27/GT25: 01.39.010 and prior; GT21/GS21: 01.40.000 and prior
Operating Systems: Mitsubishi Electric proprietary HMI OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when VNC server function is enabled and accessible via network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, allowing attackers to manipulate HMI interfaces, disrupt operations, or pivot to other industrial network segments.

🟠

Likely Case

Unauthorized access to HMI interfaces enabling monitoring of industrial processes, data theft, or limited manipulation of displayed information.

🟢

If Mitigated

Limited impact if VNC server function is disabled or network segmentation prevents access to vulnerable systems.

🌐 Internet-Facing: HIGH - Direct internet exposure allows unauthenticated remote exploitation without any credentials.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any network-connected attacker.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted packets to the VNC server port (typically 5900).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GT27/GT25: 01.39.011 or later; GT21/GS21: 01.40.001 or later

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Mitsubishi Electric support portal. 2. Backup current configuration. 3. Apply firmware update via USB or network. 4. Restart the HMI. 5. Verify firmware version is updated.

🔧 Temporary Workarounds

Disable VNC Server

all

Turn off the VNC server function if not required for operations.

Navigate to HMI settings > Communication Settings > VNC Server > Disable

Network Segmentation

all

Isolate affected HMIs in separate VLANs with strict firewall rules.

Configure firewall to block port 5900 from untrusted networks

🧯 If You Can't Patch

  • Disable VNC server function immediately if not essential
  • Implement strict network segmentation and firewall rules to block all access to port 5900 from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check HMI firmware version via System Information menu and verify if VNC server is enabled in Communication Settings.

Check Version:

Navigate to System Information > Firmware Version on HMI interface

Verify Fix Applied:

Confirm firmware version is 01.39.011 or later for GT27/GT25, or 01.40.001 or later for GT21/GS21 models.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed VNC authentication attempts
  • Unusual VNC connections from unexpected IP addresses

Network Indicators:

  • Unusual traffic patterns on port 5900
  • VNC protocol anomalies

SIEM Query:

source_port:5900 AND (event_type:authentication_failure OR protocol_anomaly:true)

🔗 References

📤 Share & Export