U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-20588

Change History

Initial Analysis by NIST 3/01/2021 8:55:51 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:mitsubishielectric:c_controller_module_setting_and_monitoring_tool:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:cpu_module_logging_configuration_tool:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:cw_configurator:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:data_transfer:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:ezsocket:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:fr_configurator:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:fr_configurator2:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:fr_configurator_sw3:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gt_got1000:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gt_got2000:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gt_softgot1000:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gt_softgot2000:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gx_configurator-dp:*:*:*:*:*:*:*:* versions up to (including) 7.14q
     *cpe:2.3:a:mitsubishielectric:gx_configurator-qp:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gx_developer:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gx_explorer:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gx_iec_developer:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gx_logviewer:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gx_remoteservice-i:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:gx_works2:*:*:*:*:*:*:*:* versions up to (including) 1.597x
     *cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:* versions up to (including) 1.070y
     *cpe:2.3:a:mitsubishielectric:m_commdtm-hart:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:m_commdtm-io-link:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:melfa-works:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:melsec_wincpu_setting_utility:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:melsoft_em_software_development_kit:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:melsoft_navigator:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:mh11_settingtool_version2:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:mi_configurator:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:mt_works2:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:mx_component:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:network_interface_board_cc-link:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:network_interface_board_cc_ie_control_utility:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:network_interface_board_cc_ie_field_utility:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:network_interface_board_mneth_utility:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:px_developer:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:rt_toolbox2:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:rt_toolbox3:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:setting\/monitoring_tools_for_the_c_controller_module:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mitsubishielectric:slmp_data_collector:*:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-755
Changed Reference Type
https://jvn.jp/vu/JVNVU92330101/index.html No Types Assigned
https://jvn.jp/vu/JVNVU92330101/index.html Third Party Advisory
Changed Reference Type
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf No Types Assigned
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf Vendor Advisory