Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-20587


Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) versions 1.003D and prior, iQ Monozukuri Process Remote Monitoring (Data Transfer) versions 1.002C and prior, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior, and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition on the software products, and possibly to execute a malicious code on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.5, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts and availability (service disruption) for affected systems. Impacting 41 products from mitsubishielectric, from mitsubishielectric, from mitsubishielectric and 38 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2021, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2021-02-19T20:15:12.833

Last Modified

2025-06-13T00:15:20.230

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-122
  • Type: Secondary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mitsubishielectric c_controller_module_setting_and_monitoring_tool * Yes
Application mitsubishielectric cpu_module_logging_configuration_tool ≤ 1.112r Yes
Application mitsubishielectric cw_configurator ≤ 1.011m Yes
Application mitsubishielectric data_transfer ≤ 3.44w Yes
Application mitsubishielectric ezsocket * Yes
Application mitsubishielectric fr_configurator * Yes
Application mitsubishielectric fr_configurator_sw3 * Yes
Application mitsubishielectric fr_configurator2 ≤ 1.24a Yes
Application mitsubishielectric gt_designer3 ≤ 1.250l Yes
Application mitsubishielectric gt_softgot1000 ≤ 3.245f Yes
Application mitsubishielectric gt_softgot2000 ≤ 1.250l Yes
Application mitsubishielectric gx_configurator-dp ≤ 7.14q Yes
Application mitsubishielectric gx_configurator-qp * Yes
Application mitsubishielectric gx_developer ≤ 8.506c Yes
Application mitsubishielectric gx_explorer * Yes
Application mitsubishielectric gx_iec_developer * Yes
Application mitsubishielectric gx_logviewer ≤ 1.115u Yes
Application mitsubishielectric gx_remoteservice-i * Yes
Application mitsubishielectric gx_works2 ≤ 1.597x Yes
Application mitsubishielectric gx_works3 ≤ 1.070y Yes
Application mitsubishielectric iq_monozukuri_andon - Yes
Application mitsubishielectric iq_monozukuri_process_remote_monitoring - Yes
Application mitsubishielectric m_commdtm-hart * Yes
Application mitsubishielectric m_commdtm-io-link * Yes
Application mitsubishielectric melfa-works ≤ 4.4 Yes
Application mitsubishielectric melsec_wincpu_setting_utility * Yes
Application mitsubishielectric melsoft_em_software_development_kit * Yes
Application mitsubishielectric melsoft_navigator ≤ 2.74c Yes
Application mitsubishielectric mh11_settingtool_version2 ≤ 2.004e Yes
Application mitsubishielectric mi_configurator * Yes
Application mitsubishielectric mt_works2 ≤ 1.167z Yes
Application mitsubishielectric mx_component ≤ 5.001b Yes
Application mitsubishielectric network_interface_board_cc-link * Yes
Application mitsubishielectric network_interface_board_cc_ie_control_utility * Yes
Application mitsubishielectric network_interface_board_cc_ie_field_utility * Yes
Application mitsubishielectric network_interface_board_mneth_utility * Yes
Application mitsubishielectric px_developer ≤ 1.53f Yes
Application mitsubishielectric rt_toolbox2 ≤ 3.73b Yes
Application mitsubishielectric rt_toolbox3 ≤ 1.82l Yes
Application mitsubishielectric setting\/monitoring_tools_for_the_c_controller_module * Yes
Application mitsubishielectric slmp_data_collector ≤ 1.04e Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For mitsubishielectric's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.