Sploit.io - Search

Product: Q06CCPU-V, version: all versions

CVE-2020-16226

Severity: Unknown

Description: Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.004770000
  • Percentile: 0.642350000
  • Date: 2025-12-28

ExploitDB

No data available.

HackerOne Data

  • Rank: 8509
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Mitsubishi Electric QJ71MES96 - Versions: all versions
    • Mitsubishi Electric QJ71WS96 - Versions: all versions
    • Mitsubishi Electric Q06CCPU-V - Versions: all versions
    • Mitsubishi Electric Q24DHCCPU-V - Versions: all versions
    • Mitsubishi Electric Q24DHCCPU-VG - Versions: all versions
    • Mitsubishi Electric R12CCPU-V - Versions: all versions
    • Mitsubishi Electric RD55UP06-V, - Versions: all versions
    • Mitsubishi Electric D55UP12-V - Versions: all versions
    • Mitsubishi Electric RJ71GN11-T2 - Versions: all versions
    • Mitsubishi Electric RJ71EN71 - Versions: all versions
    • Mitsubishi Electric QJ71E71-100 - Versions: all versions
    • Mitsubishi Electric LJ71E71-100 - Versions: all versions
    • Mitsubishi Electric QJ71MT91 - Versions: all versions
    • Mitsubishi Electric RD78Gn(n=4,8,16,32,64) - Versions: all versions
    • Mitsubishi Electric RD78GHV - Versions: all versions
    • Mitsubishi Electric RD78GHW - Versions: all versions
    • Mitsubishi Electric NZ2GACP620-60 - Versions: all versions
    • Mitsubishi Electric NZ2GACP620-300 - Versions: all versions
    • Mitsubishi Electric NZ2FT-MT - Versions: all versions
    • Mitsubishi Electric NZ2FT-EIP - Versions: all versions
    • Mitsubishi Electric Q03UDECPU - Versions: the first 5 digits of serial number 22081 and prior
    • Mitsubishi Electric QnUDEHCPU(n=04/06/10/13/20/26/50/100) - Versions: the first 5 digits of serial number 22081 and prior
    • Mitsubishi Electric QnUDVCPU(n=03/04/06/13/26) - Versions: the first 5 digits of serial number 22031 and prior
    • Mitsubishi Electric QnUDPVCPU(n=04/06/13/2) - Versions: the first 5 digits of serial number 22031 and prior
    • Mitsubishi Electric LnCPU(-P)(n=02/06/26) - Versions: the first 5 digits of serial number 22051 and prior
    • Mitsubishi Electric L26CPU-(P)BT - Versions: the first 5 digits of serial number 22051 and prior
    • Mitsubishi Electric RnCPU(n=00/01/02) - Versions: unspecified
    • Mitsubishi Electric RnCPU(n=04/08/16/32/120) - Versions: unspecified
    • Mitsubishi Electric RnENCPU(n=04/08/16/32/120) - Versions: unspecified
    • Mitsubishi Electric RnSFCPU (n=08/16/32/120) - Versions: all versions
    • Mitsubishi Electric RnPCPU(n=08/16/32/120) - Versions: all versions
    • Mitsubishi Electric RnPSFCPU(n=08/16/32/120) - Versions: all versions
    • Mitsubishi Electric FX5U(C)-**M*/** - Versions: unspecified, unspecified
    • Mitsubishi Electric FX5UC-32M*/**-TS - Versions: unspecified
    • Mitsubishi Electric FX5UJ-**M*/** - Versions: Version 1.000
    • Mitsubishi Electric FX5-ENET - Versions: all versions
    • Mitsubishi Electric FX5-ENET/IP - Versions: all versions
    • Mitsubishi Electric FX3U-ENET-ADP - Versions: all versions
    • Mitsubishi Electric FX3GE-**M*/** - Versions: all versions
    • Mitsubishi Electric FX3U-ENET - Versions: all versions
    • Mitsubishi Electric FX3U-ENET-L - Versions: all versions
    • Mitsubishi Electric FX3U-ENET-P502 - Versions: all versions
    • Mitsubishi Electric FX5-CCLGN-MS - Versions: all versions
    • Mitsubishi Electric IU1-1M20-D - Versions: all versions
    • Mitsubishi Electric LE7-40GU-L - Versions: all versions
    • Mitsubishi Electric GOT2000 Series GT21 Model - Versions: all versions
    • Mitsubishi Electric GS Series - Versions: all versions
    • Mitsubishi Electric GOT1000 Series GT14 Model - Versions: all versions
    • Mitsubishi Electric GT25-J71GN13-T2 - Versions: all versions
    • Mitsubishi Electric FR-A800-E Series - Versions: all versions
    • Mitsubishi Electric FR-F800-E Series - Versions: all versions
    • Mitsubishi Electric FR-A8NCG - Versions: Production date August 2020 and prior
    • Mitsubishi Electric FR-E800-EPA Series - Versions: Production date July 2020 and prior
    • Mitsubishi Electric FR-E800-EPB Series - Versions: Production date July 2020 and prior
    • Mitsubishi Electric Conveyor Tracking Application - Versions: APR-nTR3FH all versions, APR-nTR6FH all versions, APR-nTR12FH all versions, APR-nTR20FH(n=1,2) all versions
    • Mitsubishi Electric MR-JE-C - Versions: all versions
    • Mitsubishi Electric MR-J4-TM - Versions: all versions

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2020-16226 impacts a wide range of Mitsubishi Electric products, allowing for potential device impersonation. This means an attacker could potentially trick a legitimate device into accepting commands from a malicious source. The business impact of successful exploitation varies depending on the specific product impacted, but could range from disruption of industrial control systems and manufacturing processes to potential data compromise. The likelihood of exploitation is moderate, as the attacker needs network access to the affected devices. The ease of exploitation is also moderate, requiring some understanding of the Mitsubishi Electric protocols, but the sheer number of affected products increases the attack surface. The primary impact is to availability, with potential for disruption of operations. Integrity could also be impacted if the attacker can successfully execute arbitrary commands that modify system settings or processes. Confidentiality is less directly impacted, but possible depending on the specific device and its data handling. The EPSS score of 0.00477 indicates a relatively low, but not insignificant risk, considering the large number of potentially affected devices.

    2. Potential Attack Scenarios
    An attacker targeting a Mitsubishi Electric PLC (Programmable Logic Controller) within a manufacturing plant could leverage this vulnerability. The attack vector is network access to the PLC, potentially through a compromised workstation or direct network connection. The attacker first identifies a vulnerable PLC, such as a Q06CCPU-V. They then craft a malicious communication packet that impersonates a legitimate device interacting with the PLC, such as a Human-Machine Interface (HMI). This packet contains commands designed to alter the PLC's logic, for example, changing the speed of a conveyor belt or opening a valve prematurely. If the PLC accepts the impersonated device's commands, the attacker can remotely control the process, potentially causing production errors, equipment damage, or even safety hazards. The outcome could be a slowdown in production, faulty products, or even a complete shutdown of the affected manufacturing line.

    3. Mitigation Recommendations
    The primary mitigation is to apply available firmware updates for the affected Mitsubishi Electric products. Mitsubishi Electric has released updates to address the impersonation vulnerability. Check the Mitsubishi Electric support website for the latest firmware versions for each specific product model. Prioritize patching devices critical to production and safety. Segment the network to limit the impact of a successful attack, ensuring that vulnerable devices are isolated from critical systems. Implement strong authentication and authorization controls where possible, verifying the identity of communicating devices. Regularly monitor network traffic for suspicious activity, looking for unexpected communication patterns or commands. Refer to the CISA advisory (https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01) for more detailed information and product-specific guidance.

    4. Executive Summary
    Multiple Mitsubishi Electric products are vulnerable to a device impersonation flaw, potentially allowing attackers to remotely execute arbitrary commands. This vulnerability could disrupt industrial control systems and manufacturing processes, leading to production delays, equipment damage, or safety issues. While the likelihood of exploitation is moderate, the sheer number of affected devices increases the overall risk. It is crucial to apply the latest firmware updates from Mitsubishi Electric, prioritize patching for critical systems, and segment the network to limit the impact of a potential attack. Addressing this vulnerability is important to ensure the continued availability and integrity of your operations, minimizing potential business disruption and financial loss. Prompt action is recommended to reduce the risk posed by this vulnerability.