A specially crafted communication packet sent to the affected devices could allow remote code execution and a denial-of-service condition due to a deserialization vulnerability. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02%2C | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
07 Nov 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-07-16 22:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-12007
Mitre link : CVE-2020-12007
CVE.ORG link : CVE-2020-12007
JSON object : View
Products Affected
iconics
- bizviz
- genesis32
- genesis64
- smart_energy_analytix
- mobilehmi
- facility_analytix
- energy_analytix
- hyper_historian
- quality_analytix
mitsubishielectric
- mc_works
- mc_works32
CWE
CWE-502
Deserialization of Untrusted Data