cve/2021/CVE-2021-20597.md

18 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-20597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20597)
![](https://img.shields.io/static/v1?label=Product&message=Mitsubishi%20Electric%20MELSEC%20iQ-R%20series%20Safety%20CPU%20modules%20R08%2F16%2F32%2F120SFCPU%3B%20Mitsubishi%20Electric%20MELSEC%20iQ-R%20series%20SIL2%20Process%20CPU%20modules%20R08%2F16%2F32%2F120PSFCPU&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Mitsubishi%20Electric%20MELSEC%20iQ-R%20series%20Safety%20CPU%20modules%20R08%2F16%2F32%2F120SFCPU%20firmware%20versions%20%2226%22%20and%20prior%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Insufficiently%20Protected%20Credentials&color=brighgreen)
### Description
Insufficiently Protected Credentials vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions "26" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to login to the target unauthorizedly by sniffing network traffic and obtaining credentials when registering user information in the target or changing a password.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/NozomiNetworks/blackhat23-melsoft