Sploit.io - Search

Product: C Controller Interface Module Utility, version: >= unspecified, <= Version 2.00

CVE-2020-14521

Severity: HIGH

Description: Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition.

CVSS Score: 8.3

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.002430000
  • Percentile: 0.473750000
  • Date: 2026-01-11

ExploitDB

No data available.

HackerOne Data

  • Rank: 8558
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Mitsubishi Electric C Controller Interface Module Utility - Versions: unspecified
    • Mitsubishi Electric CC-Link IE Control Network Data Collector - Versions: Version 1.00A
    • Mitsubishi Electric CC-Link IE Field Network Data Collector - Versions: Version 1.00A
    • Mitsubishi Electric CC-Link IE TSN Data Collector - Versions: Version 1.00A
    • Mitsubishi Electric CPU Module Logging Configuration Tool - Versions: unspecified
    • Mitsubishi Electric CW Configurator - Versions: unspecified
    • Mitsubishi Electric Data Transfer - Versions: unspecified
    • Mitsubishi Electric EZSocket - Versions: unspecified
    • Mitsubishi Electric FR Configurator SW3 - Versions: All Versions
    • Mitsubishi Electric FR Configurator2 - Versions: unspecified
    • Mitsubishi Electric GT Designer2 Classic - Versions: All Versions
    • Mitsubishi Electric GT Designer3 Version1 (GOT1000) - Versions: unspecified
    • Mitsubishi Electric GT Designer3 Version1 (GOT2000) - Versions: unspecified
    • Mitsubishi Electric GT SoftGOT1000 Version3 - Versions: unspecified
    • Mitsubishi Electric GT SoftGOT2000 Version1 - Versions: unspecified
    • Mitsubishi Electric GX Developer - Versions: unspecified
    • Mitsubishi Electric GX LogViewer - Versions: unspecified
    • Mitsubishi Electric GX Works2 - Versions: unspecified
    • Mitsubishi Electric GX Works3 - Versions: unspecified
    • Mitsubishi Electric M_CommDTM-IO-Link - Versions: unspecified
    • Mitsubishi Electric MELFA-Works - Versions: unspecified
    • Mitsubishi Electric MELSEC WinCPU Setting Utility - Versions: All Versions
    • Mitsubishi Electric MELSOFT Complete Clean Up Tool - Versions: unspecified
    • Mitsubishi Electric MELSOFT EM Software Development Kit - Versions: unspecified
    • Mitsubishi Electric MELSOFT iQ AppPortal - Versions: unspecified
    • Mitsubishi Electric MELSOFT Navigator - Versions: unspecified
    • Mitsubishi Electric MI Configurator - Versions: unspecified
    • Mitsubishi Electric Motion Control Setting - Versions: unspecified
    • Mitsubishi Electric Motorizer - Versions: unspecified
    • Mitsubishi Electric MR Configurator2 - Versions: unspecified
    • Mitsubishi Electric MT Works2 - Versions: unspecified
    • Mitsubishi Electric MTConnect Data Collector - Versions: unspecified
    • Mitsubishi Electric MX Component - Versions: unspecified
    • Mitsubishi Electric MX MESInterface - Versions: unspecified
    • Mitsubishi Electric MX MESInterface-R - Versions: unspecified
    • Mitsubishi Electric MX Sheet - Versions: unspecified
    • Mitsubishi Electric Network Interface Board CC IE Control Utility - Versions: unspecified
    • Mitsubishi Electric Network Interface Board CC IE Field Utility - Versions: unspecified
    • Mitsubishi Electric Network Interface Board CC-Link Ver.2 Utility - Versions: unspecified
    • Mitsubishi Electric Network Interface Board MNETH Utility - Versions: unspecified
    • Mitsubishi Electric Position Board utility 2 - Versions: unspecified
    • Mitsubishi Electric PX Developer - Versions: unspecified
    • Mitsubishi Electric RT ToolBox2 - Versions: unspecified
    • Mitsubishi Electric RT ToolBox3 - Versions: unspecified
    • Mitsubishi Electric Setting/Monitoring tools for the C Controller module - Versions: unspecified, unspecified
    • Mitsubishi Electric SLMP Data Collector - Versions: unspecified

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, identified as CVE-2020-14521, is an unquoted search path or element issue present in multiple Mitsubishi Electric Factory Automation engineering software products. This allows a malicious attacker to potentially execute code, resulting in information theft, data modification, or a denial-of-service condition. The CVSS score of 8.3 (High) indicates a significant risk. Exploitation requires user interaction, meaning an attacker needs to entice a user to execute a malicious file or open a specially crafted project. However, once exploited, the impact is substantial, affecting confidentiality, integrity, and availability across a wide range of affected products. The likelihood of exploitation is moderate, dependent on successful social engineering or targeted attacks. The business impact could range from production downtime and lost data to compromised process control systems, depending on the specific software affected and its role within the industrial environment. Given the breadth of impacted software, the overall risk to organizations utilizing Mitsubishi Electric's Factory Automation suite is considerable.

    2. Potential Attack Scenarios
    An attacker could craft a malicious project file for one of the affected software packages, such as GT Designer3. They could then deliver this file to an engineer via email or a shared network drive, masquerading it as a legitimate project. When the engineer opens the project, the vulnerable software searches for required libraries or components using an unquoted search path. The attacker’s malicious code, placed in a directory with a space in the name, is then executed before the intended library. This allows the attacker to gain control of the engineer’s workstation, potentially escalating privileges to access the broader control system network. From there, the attacker could steal proprietary process data, modify control logic, or disrupt production by causing a denial-of-service. This attack relies on successful social engineering to get the engineer to open the malicious project file but could be very effective in a targeted attack.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade the affected Mitsubishi Electric software to the latest patched versions. Mitsubishi Electric provides specific updates for each product identified as vulnerable. Refer to the CISA advisory (https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-04) and the vendor advisory (https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-007_en.pdf) for the specific version requirements for each product.
    In addition to patching, organizations should implement these interim measures:
    * Implement strong application whitelisting to control which executables can run on engineering workstations.
    * Train engineers to be wary of opening project files from untrusted sources.
    * Segment the control system network to limit the impact of a successful compromise.
    * Regularly scan engineering workstations for malware and vulnerabilities.
    * Review and enforce least privilege access controls for engineering workstations and network shares.

    4. Executive Summary
    Multiple Mitsubishi Electric Factory Automation engineering software products are vulnerable to a malicious code execution issue (CVE-2020-14521). This vulnerability allows attackers to potentially gain control of engineering workstations, steal data, modify process logic, or disrupt production. While exploitation requires a user to interact with a malicious file, the impact can be significant. It is critical to patch all affected software to the latest versions as quickly as possible. This vulnerability poses a moderate to high risk to organizations relying on Mitsubishi Electric’s Factory Automation solutions, and prompt action is needed to minimize potential business disruption and data compromise. The impact spans across several products, so a comprehensive patching effort is required. Prioritize patching based on the criticality of the affected software within your operational environment.