CVE-2021-20601

7.5 HIGH

📋 TL;DR

An improper input validation vulnerability in Mitsubishi Electric GOT2000 and related HMI products allows remote unauthenticated attackers to write values exceeding configured limits by sending malicious packets. This can cause system malfunctions or operational disruptions. Affected systems include GOT2000 series GT21-GT27 models, GS21 models, and GT SoftGOT2000.

💻 Affected Systems

Products:
  • GOT2000 series GT27 model
  • GOT2000 series GT25 model
  • GOT2000 series GT23 model
  • GOT2000 series GT21 model
  • GOT SIMPLE series GS21 model
  • GT SoftGOT2000
Versions: All versions
Operating Systems: Embedded/proprietary HMI OS
Default Config Vulnerable: ⚠️ Yes
Notes: All versions of listed products are vulnerable. These are industrial human-machine interfaces used in manufacturing and critical infrastructure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system malfunction leading to industrial process disruption, equipment damage, or safety incidents in critical infrastructure environments.

🟠

Likely Case

Process disruption, unexpected equipment behavior, or temporary system unavailability requiring manual intervention.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially causing minor operational anomalies.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible from internet-facing systems.
🏢 Internal Only: MEDIUM - Requires network access but no authentication, making internal compromise easier.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote unauthenticated exploitation with specially crafted packets. No public exploit code identified but vulnerability is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Mitsubishi Electric for specific firmware updates

Vendor Advisory: https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2021-018.pdf

Restart Required: Yes

Instructions:

1. Contact Mitsubishi Electric for firmware updates
2. Backup current configuration
3. Apply firmware update following vendor instructions
4. Restart affected devices
5. Verify proper operation

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate network segments with strict firewall rules

Access Control Lists

all

Implement strict network ACLs to limit communication to trusted sources only

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to isolate affected devices from untrusted networks
  • Deploy intrusion detection systems to monitor for malicious packet patterns targeting these devices

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against affected products list. All versions of listed models are vulnerable.

Check Version:

Check device information screen on HMI or consult device documentation for version checking procedure

Verify Fix Applied:

Verify with Mitsubishi Electric that specific firmware version addresses CVE-2021-20601 and confirm no unauthorized value writes occur.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected value writes exceeding configured limits
  • Device communication anomalies
  • System malfunction alerts

Network Indicators:

  • Malformed packets targeting HMI communication ports
  • Unauthorized network connections to affected devices

SIEM Query:

Search for network traffic to port 5006/TCP (MELSEC protocol) with unusual patterns or from unauthorized sources

🔗 References

📤 Share & Export