CVE Vulnerabilities

CVE-2020-5654

Session Fixation

Published: Nov 02, 2020 | Modified: Nov 10, 2020
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu

Session fixation vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are 02 or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are 01 or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are 08 or before, RD81MES96N MES Interface Module First 2 digits of serial number are 04 or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are 04 or before) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet.

Weakness

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

Affected Software

Name Vendor Start Version End Version
Melsec_iq-rj71eip91_firmware Mitsubishielectric - (including) - (including)

Extended Description

Such a scenario is commonly observed when:

Potential Mitigations

References