CVE-2021-20610

7.5 HIGH

📋 TL;DR

This vulnerability in Mitsubishi Electric PLCs allows remote unauthenticated attackers to send specially crafted packets that cause a denial-of-service condition, requiring system reset for recovery. It affects multiple MELSEC iQ-R, Q, L series and MELIPC industrial control system products used in manufacturing and critical infrastructure.

💻 Affected Systems

Products:
  • MELSEC iQ-R Series R00/01/02CPU
  • MELSEC iQ-R Series R04/08/16/32/120(EN)CPU
  • MELSEC iQ-R Series R08/16/32/120SFCPU
  • MELSEC iQ-R Series R08/16/32/120PCPU
  • MELSEC iQ-R Series R08/16/32/120PSFCPU
  • MELSEC iQ-R Series R16/32/64MTCPU
  • MELSEC iQ-R Series R12CCPU-V
  • MELSEC Q Series Q03UDECPU
  • MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU
  • MELSEC Q Series Q03/04/06/13/26UDVCPU
  • MELSEC Q Series Q04/06/13/26UDPVCPU
  • MELSEC Q Series Q12DCCPU-V
  • MELSEC Q Series Q24DHCCPU-V(G)
  • MELSEC Q Series Q24/26DHCCPU-LS
  • MELSEC Q Series MR-MQ100
  • MELSEC Q Series Q172/173DCPU-S1
  • MELSEC Q Series Q172/173DSCPU
  • MELSEC Q Series Q170MCPU
  • MELSEC Q Series Q170MSCPU(-S1)
  • MELSEC L Series L02/06/26CPU(-P)
  • MELSEC L Series L26CPU-(P)BT
  • MELIPC Series MI5122-VW
Versions: All versions prior to firmware updates
Operating Systems: Embedded PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations of these industrial control systems. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system shutdown requiring physical reset, disrupting industrial processes and potentially causing safety incidents or production losses.

🟠

Likely Case

Temporary denial-of-service affecting PLC operations until manual reset is performed.

🟢

If Mitigated

Limited impact if systems are isolated behind firewalls with strict network controls.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible from internet-facing systems.
🏢 Internal Only: MEDIUM - Internal attackers or malware could still exploit if network segmentation is weak.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted packets but no authentication needed. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in vendor advisory

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-019_en.pdf

Restart Required: Yes

Instructions:

1. Check specific product firmware version against vendor advisory. 2. Download appropriate firmware update from Mitsubishi Electric support portal. 3. Apply firmware update following manufacturer's procedures. 4. Restart affected PLCs.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs in separate network segments with strict firewall rules

Access Control Lists

all

Implement network ACLs to restrict access to PLC communication ports

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to block unauthorized access to PLCs
  • Monitor network traffic for anomalous packets and implement intrusion detection systems

🔍 How to Verify

Check if Vulnerable:

Check PLC firmware version against vendor advisory list of affected versions

Check Version:

Use Mitsubishi Electric programming software (GX Works3/GX Works2) to read PLC firmware version

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • PLC error logs showing communication failures
  • System reset events without clear cause

Network Indicators:

  • Anomalous packets to PLC communication ports (typically 5006/UDP, 5007/UDP)
  • Unexpected traffic patterns to industrial control systems

SIEM Query:

source="network_firewall" dest_port IN (5006,5007) AND protocol="UDP" AND packet_size>normal_threshold

🔗 References

📤 Share & Export