{"containers":{"cna":{"affected":[{"product":"Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"MELSEC-Q Series C Controller Module(Q24DHCCPU-V, Q24DHCCPU-VG User Ethernet port (CH1, CH2): First 5 digits of serial number 21121 or before), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module(R12CCPU-V Ethernet port (CH1, CH2): First 2 digits of serial number 11 or before, and RD55UP06-V Ethernet port: First 2 digits of serial number 08 or before), and MELIPC Series MI5000(MI5122-VW Ethernet port (CH1): First 2 digits of serial number 03 or before, or the firmware version 03 or before)"}]}],"descriptions":[{"lang":"en","value":"Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000 MELSEC-Q Series C Controller Module(Q24DHCCPU-V, Q24DHCCPU-VG User Ethernet port (CH1, CH2): First 5 digits of serial number 21121 or before), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module(R12CCPU-V Ethernet port (CH1, CH2): First 2 digits of serial number 11 or before, and RD55UP06-V Ethernet port: First 2 digits of serial number 08 or before), and MELIPC Series MI5000(MI5122-VW Ethernet port (CH1): First 2 digits of serial number 03 or before, or the firmware version 03 or before) allow remote attackers to cause a denial of service and/or malware being executed via unspecified vectors."}],"problemTypes":[{"descriptions":[{"description":"Denial-of-service (DoS) and malware execution","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-02-17T06:55:15.000Z","orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf"},{"tags":["x_refsource_MISC"],"url":"https://jvn.jp/en/vu/JVNVU95424547/index.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vultures@jpcert.or.jp","ID":"CVE-2020-5531","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000","version":{"version_data":[{"version_value":"MELSEC-Q Series C Controller Module(Q24DHCCPU-V, Q24DHCCPU-VG User Ethernet port (CH1, CH2): First 5 digits of serial number 21121 or before), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module(R12CCPU-V Ethernet port (CH1, CH2): First 2 digits of serial number 11 or before, and RD55UP06-V Ethernet port: First 2 digits of serial number 08 or before), and MELIPC Series MI5000(MI5122-VW Ethernet port (CH1): First 2 digits of serial number 03 or before, or the firmware version 03 or before)"}]}}]},"vendor_name":"Mitsubishi Electric Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000 MELSEC-Q Series C Controller Module(Q24DHCCPU-V, Q24DHCCPU-VG User Ethernet port (CH1, CH2): First 5 digits of serial number 21121 or before), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module(R12CCPU-V Ethernet port (CH1, CH2): First 2 digits of serial number 11 or before, and RD55UP06-V Ethernet port: First 2 digits of serial number 08 or before), and MELIPC Series MI5000(MI5122-VW Ethernet port (CH1): First 2 digits of serial number 03 or before, or the firmware version 03 or before) allow remote attackers to cause a denial of service and/or malware being executed via unspecified vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Denial-of-service (DoS) and malware execution"}]}]},"references":{"reference_data":[{"name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf","refsource":"MISC","url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf"},{"name":"https://jvn.jp/en/vu/JVNVU95424547/index.html","refsource":"MISC","url":"https://jvn.jp/en/vu/JVNVU95424547/index.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T08:30:24.566Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2019-003_en.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://jvn.jp/en/vu/JVNVU95424547/index.html"}]}]},"cveMetadata":{"assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","assignerShortName":"jpcert","cveId":"CVE-2020-5531","datePublished":"2020-02-17T06:55:15.000Z","dateReserved":"2020-01-06T00:00:00.000Z","dateUpdated":"2024-08-04T08:30:24.566Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}