CVE-2021-20597
📋 TL;DR
This vulnerability allows remote unauthenticated attackers to capture credentials transmitted in plaintext during user registration or password changes on affected Mitsubishi Electric industrial control systems. Attackers can then use these credentials to gain unauthorized access to safety-critical PLCs. Organizations using the specified MELSEC iQ-R series Safety CPU and SIL2 Process CPU modules with vulnerable firmware are affected.
💻 Affected Systems
- Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU
- Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU
📦 What is this software?
R08psfcpu Firmware by Mitsubishielectric
R08sfcpu Firmware by Mitsubishielectric
R120psfcpu Firmware by Mitsubishielectric
R120sfcpu Firmware by Mitsubishielectric
R16psfcpu Firmware by Mitsubishielectric
R16sfcpu Firmware by Mitsubishielectric
R32psfcpu Firmware by Mitsubishielectric
R32sfcpu Firmware by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of safety-critical industrial control systems, allowing attackers to manipulate safety functions, disrupt operations, cause physical damage, or create hazardous conditions in industrial environments.
Likely Case
Unauthorized access to PLCs enabling attackers to read/write program logic, modify configurations, disrupt industrial processes, or establish persistence in OT networks.
If Mitigated
Limited impact if systems are air-gapped, network segmentation prevents credential sniffing, and strong authentication controls are in place.
🎯 Exploit Status
Exploitation requires network sniffing capability but no authentication. Credentials are transmitted in plaintext during specific operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Safety CPU: firmware version '27' or later; SIL2 Process CPU: firmware version '12' or later
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-009_en.pdf
Restart Required: Yes
Instructions:
1. Download updated firmware from Mitsubishi Electric support portal. 2. Backup current configuration and program. 3. Update firmware using engineering software (MELSOFT). 4. Verify firmware version after update. 5. Restart affected CPU modules.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected PLCs in separate network segments to prevent credential sniffing from untrusted networks.
Disable Remote User Management
allConfigure systems to only allow user registration and password changes via local engineering stations, not over network.
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to prevent unauthorized access to affected PLCs
- Monitor network traffic for credential sniffing attempts and unauthorized access patterns
🔍 How to Verify
Check if Vulnerable:
Check firmware version via engineering software (MELSOFT) or CPU module display. Safety CPU versions '26' or earlier and SIL2 Process CPU versions '11' or earlier are vulnerable.
Check Version:
Use MELSOFT engineering software to read CPU module firmware version
Verify Fix Applied:
Confirm firmware version is Safety CPU '27' or later or SIL2 Process CPU '12' or later using engineering software.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login
- User account creation or password changes from unexpected sources
- Network traffic showing plaintext credential transmission
Network Indicators:
- Sniffing tools on network segments containing PLCs
- Unauthorized access attempts to CPU modules
- Plaintext protocol analysis showing credential exposure
SIEM Query:
source_ip IN (PLC_network) AND (event_type='authentication' AND result='success' AFTER multiple_failures) OR (protocol_analysis LIKE '%password%' OR '%credential%')
🔗 References
- https://jvn.jp/vu/JVNVU98578731/index.html
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-250-01
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-009_en.pdf
- https://jvn.jp/vu/JVNVU98578731/index.html
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-250-01
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-009_en.pdf