CVE-2020-5596

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) does not properly manage sessions, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mitsubishielectric:coreos:*:*:*:*:*:*:*:*
OR cpe:2.3:h:mitsubishielectric:got2000_gt23:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:got2000_gt25:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:got2000_gt27:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://jvn.jp/en/vu/JVNVU95413676/index.html - Third Party Advisory () https://jvn.jp/en/vu/JVNVU95413676/index.html - Third Party Advisory
References () https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-005_en.pdf - Vendor Advisory () https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-005_en.pdf - Vendor Advisory

Information

Published : 2020-07-07 09:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5596

Mitre link : CVE-2020-5596

CVE.ORG link : CVE-2020-5596


JSON object : View

Products Affected

mitsubishielectric

  • coreos
  • got2000_gt23
  • got2000_gt25
  • got2000_gt27
CWE
CWE-384

Session Fixation