### [CVE-2021-20597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20597) ![](https://img.shields.io/static/v1?label=Product&message=Mitsubishi%20Electric%20MELSEC%20iQ-R%20series%20Safety%20CPU%20modules%20R08%2F16%2F32%2F120SFCPU%3B%20Mitsubishi%20Electric%20MELSEC%20iQ-R%20series%20SIL2%20Process%20CPU%20modules%20R08%2F16%2F32%2F120PSFCPU&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Mitsubishi%20Electric%20MELSEC%20iQ-R%20series%20Safety%20CPU%20modules%20R08%2F16%2F32%2F120SFCPU%20firmware%20versions%20%2226%22%20and%20prior%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Insufficiently%20Protected%20Credentials&color=brighgreen) ### Description Insufficiently Protected Credentials vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions "26" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to login to the target unauthorizedly by sniffing network traffic and obtaining credentials when registering user information in the target or changing a password. ### POC #### Reference No PoCs from references. #### Github - https://github.com/NozomiNetworks/blackhat23-melsoft