CVE-2021-20591

7.5 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to cause denial of service (DoS) on Mitsubishi Electric MELSEC iQ-R series CPU modules by exploiting improper connection handling. Attackers can prevent legitimate clients from connecting to the MELSOFT transmission port by not closing connections properly. All organizations using affected MELSEC iQ-R series CPU modules are vulnerable.

💻 Affected Systems

Products:
  • Mitsubishi Electric MELSEC iQ-R series CPU modules
Versions: All versions of affected CPU modules
Operating Systems: Industrial control system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects R00/01/02CPU, R04/08/16/32/120(EN)CPU, R08/16/32/120SFCPU, R08/16/32/120PCPU, R08/16/32/120PSFCPU all versions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service preventing all legitimate connections to the MELSOFT transmission port, disrupting industrial control operations.

🟠

Likely Case

Partial or intermittent DoS affecting industrial control system availability and reliability.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring in place.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing systems extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or malware could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to TCP port 5006/5007 (MELSOFT transmission port) and ability to establish connections without proper closure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates available - specific versions depend on CPU model

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-003_en.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Mitsubishi Electric website. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart affected CPU modules. 5. Verify update completion.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MELSEC iQ-R systems from untrusted networks using firewalls.

Port Restriction

all

Restrict access to TCP ports 5006 and 5007 to trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to affected systems
  • Deploy network monitoring and intrusion detection for abnormal connection patterns

🔍 How to Verify

Check if Vulnerable:

Check if you have affected MELSEC iQ-R CPU modules and verify firmware version against vendor advisory.

Check Version:

Use MELSOFT engineering software to check CPU module firmware version

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusually high number of TCP connections to port 5006/5007
  • Connection timeouts or failures on MELSOFT transmission port

Network Indicators:

  • Multiple incomplete TCP handshakes to port 5006/5007
  • Sustained connections without data transfer

SIEM Query:

source_port:5006 OR source_port:5007 AND (connection_count > threshold OR connection_duration > threshold)

🔗 References

📤 Share & Export