Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-20613

EPSS 0.35% · P58
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-20613

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper initialization vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.16 and prior, FX3U-ENET-L Firmware version 1.16 and prior and FX3U-ENET-P502 Firmware version 1.16 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product by sending specially crafted packets. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mitsubishi Electric MELSEC-F Series 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mitsubishi Electric MELSEC-F Series是日本三菱电机(Mitsubishi Electric)公司的工控设备具有模拟和通信功能可扩展性的基本微型 PLC。 Mitsubishi Electric MELSEC-F Series 存在安全漏洞,该漏洞源于产品通信服务存在缺陷。攻击者可以发送一个特别设计的数据包,该数据包可以在产品的通信功能中创建一个拒绝服务条件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-MELSEC-F series FX3U-ENET; MELSEC-F series FX3U-ENET-L; MELSEC-F series FX3U-ENET-P502 Firmware version 1.16 and prior -

II. Public POCs for CVE-2021-20613

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-20613

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-01-14 · 61 CVEs total

CVE-2021-235677.5 HIGHDenial of Service (DoS)
CVE-2021-235664.0 MEDIUMInformation Exposure
CVE-2021-46020mruby缓冲区错误漏洞
CVE-2021-39634Google Android 资源管理错误漏洞
CVE-2021-46169Modex 资源管理错误漏洞
CVE-2021-46168Spin缓冲区错误漏洞
CVE-2021-46021GNU Recutils 资源管理错误漏洞
CVE-2021-1037Google Android Automotive OS安全漏洞
CVE-2021-1036Android Automotive Os安全漏洞
CVE-2021-1035Android Automotive Os 安全漏洞
CVE-2021-39684Google Android 安全漏洞
CVE-2021-39683Google Android 缓冲区错误漏洞
CVE-2021-45773lib60870代码问题漏洞
CVE-2021-39682Google Android 缓冲区错误漏洞
CVE-2021-39681Google Android 资源管理错误漏洞
CVE-2021-39680Google Android 信息泄露漏洞
CVE-2021-39679Google Android 资源管理错误漏洞
CVE-2021-39678Google Android 安全漏洞
CVE-2021-39659Google Android 安全漏洞
CVE-2021-39633Google Android 缓冲区错误漏洞

Showing top 20 of 61 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-20613

No comments yet


Leave a comment