CWE-342
Predictable Exact Value from Previous Values
An exact value or random number can be precisely predicted by observing previous values.
CVE-2020-16226 (GCVE-0-2020-16226)
Vulnerability from cvelistv5
Published
2020-10-05 17:19
Modified
2024-09-17 00:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-342 - PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES
Summary
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Mitsubishi Electric | QJ71MES96 |
Version: all versions |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:37:54.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "QJ71MES96", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71WS96", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q06CCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q24DHCCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q24DHCCPU-VG", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "R12CCPU-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD55UP06-V,", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "D55UP12-V", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RJ71GN11-T2", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RJ71EN71", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71E71-100", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LJ71E71-100", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "QJ71MT91", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78Gn(n=4,8,16,32,64)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78GHV", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RD78GHW", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2GACP620-60", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2GACP620-300", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2FT-MT", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "NZ2FT-EIP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "Q03UDECPU", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22081 and prior" } ] }, { "product": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22081 and prior" } ] }, { "product": "QnUDVCPU(n=03/04/06/13/26)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22031 and prior" } ] }, { "product": "QnUDPVCPU(n=04/06/13/2)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22031 and prior" } ] }, { "product": "LnCPU(-P)(n=02/06/26)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22051 and prior" } ] }, { "product": "L26CPU-(P)BT", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "the first 5 digits of serial number 22051 and prior" } ] }, { "product": "RnCPU(n=00/01/02)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 18 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnCPU(n=04/08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 50 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnENCPU(n=04/08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 50 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RnSFCPU (n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RnPCPU(n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "RnPSFCPU(n=08/16/32/120)", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5U(C)-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Serial number 17X**** or later: Version 1.210 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "Serial number 179**** and prior: Version 1.070 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FX5UC-32M*/**-TS", "vendor": "Mitsubishi Electric", "versions": [ { "lessThan": "Version 1.210 and prior", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FX5UJ-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 1.000" } ] }, { "product": "FX5-ENET", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5-ENET/IP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-ADP", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3GE-**M*/**", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-L", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX3U-ENET-P502", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FX5-CCLGN-MS", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "IU1-1M20-D", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "LE7-40GU-L", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GOT2000 Series GT21 Model", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GS Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GOT1000 Series GT14 Model", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "GT25-J71GN13-T2", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-A800-E Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-F800-E Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "FR-A8NCG", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date August 2020 and prior" } ] }, { "product": "FR-E800-EPA Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date July 2020 and prior" } ] }, { "product": "FR-E800-EPB Series", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Production date July 2020 and prior" } ] }, { "product": "Conveyor Tracking Application", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "APR-nTR3FH all versions" }, { "status": "affected", "version": "APR-nTR6FH all versions" }, { "status": "affected", "version": "APR-nTR12FH all versions" }, { "status": "affected", "version": "APR-nTR20FH(n=1,2) all versions" } ] }, { "product": "MR-JE-C", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "product": "MR-J4-TM", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "datePublic": "2020-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-05T17:19:17", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ], "source": { "advisory": "ICSA-20-245-01", "discovery": "UNKNOWN" }, "title": "Mitsubishi Electric Multiple Products", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2020-09-01T16:00:00.000Z", "ID": "CVE-2020-16226", "STATE": "PUBLIC", "TITLE": "Mitsubishi Electric Multiple Products" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QJ71MES96", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71WS96", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q06CCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q24DHCCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q24DHCCPU-VG", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "R12CCPU-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD55UP06-V,", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "D55UP12-V", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RJ71GN11-T2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RJ71EN71", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71E71-100", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "LJ71E71-100", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "QJ71MT91", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78Gn(n=4,8,16,32,64)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78GHV", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RD78GHW", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2GACP620-60", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2GACP620-300", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2FT-MT", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "NZ2FT-EIP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "Q03UDECPU", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22081 and prior" } ] } }, { "product_name": "QnUDEHCPU(n=04/06/10/13/20/26/50/100)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22081 and prior" } ] } }, { "product_name": "QnUDVCPU(n=03/04/06/13/26)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22031 and prior" } ] } }, { "product_name": "QnUDPVCPU(n=04/06/13/2)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22031 and prior" } ] } }, { "product_name": "LnCPU(-P)(n=02/06/26)", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22051 and prior" } ] } }, { "product_name": "L26CPU-(P)BT", "version": { "version_data": [ { "version_affected": "=", "version_value": "the first 5 digits of serial number 22051 and prior" } ] } }, { "product_name": "RnCPU(n=00/01/02)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 18 and prior" } ] } }, { "product_name": "RnCPU(n=04/08/16/32/120)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 50 and prior" } ] } }, { "product_name": "RnENCPU(n=04/08/16/32/120)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 50 and prior" } ] } }, { "product_name": "RnSFCPU (n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RnPCPU(n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "RnPSFCPU(n=08/16/32/120)", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5U(C)-**M*/**", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Serial number 17X**** or later: Version 1.210 and prior" }, { "version_affected": "\u003c", "version_value": "Serial number 179**** and prior: Version 1.070 and prior" } ] } }, { "product_name": "FX5UC-32M*/**-TS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "Version 1.210 and prior" } ] } }, { "product_name": "FX5UJ-**M*/**", "version": { "version_data": [ { "version_affected": "=", "version_value": "Version 1.000" } ] } }, { "product_name": "FX5-ENET", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5-ENET/IP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-ADP", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3GE-**M*/**", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-L", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX3U-ENET-P502", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FX5-CCLGN-MS", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "IU1-1M20-D", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "LE7-40GU-L", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GOT2000 Series GT21 Model", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GS Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GOT1000 Series GT14 Model", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "GT25-J71GN13-T2", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-A800-E Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-F800-E Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "FR-A8NCG", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date August 2020 and prior" } ] } }, { "product_name": "FR-E800-EPA Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date July 2020 and prior" } ] } }, { "product_name": "FR-E800-EPB Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "Production date July 2020 and prior" } ] } }, { "product_name": "Conveyor Tracking Application", "version": { "version_data": [ { "version_affected": "=", "version_name": "APR-nTR3FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR6FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR12FH", "version_value": "all versions" }, { "version_affected": "=", "version_name": "APR-nTR20FH(n=1,2)", "version_value": "all versions" } ] } }, { "product_name": "MR-JE-C", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } }, { "product_name": "MR-J4-TM", "version": { "version_data": [ { "version_affected": "=", "version_value": "all versions" } ] } } ] }, "vendor_name": "Mitsubishi Electric" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "PREDICTABLE EXACT VALUE FROM PREVIOUS VALUES CWE-342" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-245-01" } ] }, "source": { "advisory": "ICSA-20-245-01", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-16226", "datePublished": "2020-10-05T17:19:17.358565Z", "dateReserved": "2020-07-31T00:00:00", "dateUpdated": "2024-09-17T00:25:38.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-28388 (GCVE-0-2020-28388)
Vulnerability from cvelistv5
Published
2021-02-09 00:00
Modified
2024-08-04 16:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Summary
A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus ReadyStart V3 (All versions < V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Siemens | APOGEE PXC Compact (BACnet) |
Version: All versions < V3.5.5 |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:33:58.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436469.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Compact (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "APOGEE PXC Modular (P2 Ethernet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2.8.20" } ] }, { "defaultStatus": "unknown", "product": "Nucleus NET", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V5.2" } ] }, { "defaultStatus": "unknown", "product": "Nucleus ReadyStart V3", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V2012.12" } ] }, { "defaultStatus": "unknown", "product": "Nucleus Source Code", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "PLUSCONTROL 1st Gen", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Compact (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] }, { "defaultStatus": "unknown", "product": "TALON TC Modular (BACnet)", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V3.5.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions \u003c V2.8.20), APOGEE PXC Modular (BACnet) (All versions \u003c V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions \u003c V2.8.20), Nucleus NET (All versions \u003c V5.2), Nucleus ReadyStart V3 (All versions \u003c V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions \u003c V3.5.5), TALON TC Modular (BACnet) (All versions \u003c V3.5.5). Initial Sequence Numbers (ISNs) for TCP connections are derived from an insufficiently random source. As a result, the ISN of current and future TCP connections could be predictable. An attacker could hijack existing sessions or spoof future ones." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "CWE-342: Predictable Exact Value from Previous Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-08T09:20:06.562Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436469.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2020-28388", "datePublished": "2021-02-09T00:00:00", "dateReserved": "2020-11-10T00:00:00", "dateUpdated": "2024-08-04T16:33:58.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-27577 (GCVE-0-2022-27577)
Vulnerability from cvelistv5
Published
2022-04-11 19:37
Modified
2024-08-03 05:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | SICK MSC800 |
Version: All versions before 4.15 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sick.com/psirt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SICK MSC800", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions before 4.15" } ] } ], "descriptions": [ { "lang": "en", "value": "The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "CWE-342", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:37:47", "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "shortName": "SICK AG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://sick.com/psirt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@sick.de", "ID": "CVE-2022-27577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SICK MSC800", "version": { "version_data": [ { "version_value": "All versions before 4.15" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-342" } ] } ] }, "references": { "reference_data": [ { "name": "https://sick.com/psirt", "refsource": "MISC", "url": "https://sick.com/psirt" } ] } } } }, "cveMetadata": { "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "assignerShortName": "SICK AG", "cveId": "CVE-2022-27577", "datePublished": "2022-04-11T19:37:47", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:59.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29930 (GCVE-0-2022-29930)
Vulnerability from cvelistv5
Published
2022-05-12 08:35
Modified
2024-08-03 06:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Summary
SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ktorio/ktor/pull/2966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ktor", "vendor": "JetBrains", "versions": [ { "status": "affected", "version": "2.0.0" }, { "lessThan": "2.0.1", "status": "affected", "version": "2.0.1", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "CWE-342: Predictable Exact Value from Previous Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T10:55:09", "orgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "shortName": "JetBrains" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ktorio/ktor/pull/2966" } ], "source": { "defect": [ "KTOR-4217" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jetbrains.com", "ID": "CVE-2022-29930", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ktor", "version": { "version_data": [ { "version_affected": "=", "version_name": "2.0.0", "version_value": "2.0.0" }, { "version_affected": "\u003c", "version_name": "2.0.1", "version_value": "2.0.1" } ] } } ] }, "vendor_name": "JetBrains" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-342: Predictable Exact Value from Previous Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jetbrains.com/privacy-security/issues-fixed/", "refsource": "MISC", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/" }, { "name": "https://github.com/ktorio/ktor/pull/2966", "refsource": "MISC", "url": "https://github.com/ktorio/ktor/pull/2966" } ] }, "source": { "defect": [ "KTOR-4217" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "547ada31-17d8-4964-bc5f-1b8238ba8014", "assignerShortName": "JetBrains", "cveId": "CVE-2022-29930", "datePublished": "2022-05-12T08:35:17", "dateReserved": "2022-04-29T00:00:00", "dateUpdated": "2024-08-03T06:33:43.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-3373 (GCVE-0-2023-3373)
Vulnerability from cvelistv5
Published
2023-08-03 23:44
Modified
2025-02-27 21:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-342 - Predictable Exact Value from Previous Values
Summary
Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Mitsubishi Electric Corporation | GOT2000 Series GT21 model |
Version: 01.49.000 and prior |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU92167394/index.html" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3373", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T21:51:02.316826Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T21:11:06.051Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GOT2000 Series GT21 model", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "01.49.000 and prior" } ] }, { "defaultStatus": "unaffected", "product": "GOT SIMPLE Series GS21 model", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "01.49.000 and prior" } ] } ], "datePublic": "2023-08-03T03:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it." } ], "value": "Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-342", "description": "CWE-342 Predictable Exact Value from Previous Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-03T23:44:40.341Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf" }, { "url": "https://jvn.jp/vu/JVNVU92167394/index.html" }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-01" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2023-3373", "datePublished": "2023-08-03T23:44:40.341Z", "dateReserved": "2023-06-23T01:32:29.994Z", "dateUpdated": "2025-02-27T21:11:06.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phases:
Description:
- Increase the entropy used to seed a PRNG.
Mitigation ID: MIT-2
Phases: Architecture and Design, Requirements
Strategy: Libraries or Frameworks
Description:
- Use products or modules that conform to FIPS 140-2 [REF-267] to avoid obvious entropy problems. Consult FIPS 140-2 Annex C ("Approved Random Number Generators").
Mitigation ID: MIT-50
Phase: Implementation
Description:
- Use a PRNG that periodically re-seeds itself using input from high-quality sources, such as hardware devices with high entropy. However, do not re-seed too frequently, or else the entropy source might block.
No CAPEC attack patterns related to this CWE.