{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T07:04:42.065","vulnerabilities":[{"cve":{"id":"CVE-2021-20599","sourceIdentifier":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published":"2021-10-14T15:15:08.827","lastModified":"2024-11-21T05:46:51.317","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cleartext Transmission of Sensitive InformationCleartext transmission of sensitive information vulnerability in MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU firmware versions \"26\" and prior and MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU firmware versions \"11\" and prior allows a remote unauthenticated attacker to login to a target CPU module by obtaining credentials other than password."},{"lang":"es","value":"La vulnerabilidad de transmisión de texto claro de información sensible en las versiones de firmware \"26\" y anteriores de la CPU de seguridad R08/16/32/120SFCPU de la serie iQ-R de MELSEC y en la CPU de proceso SIL2 R08/16/32/120PSFCPU de la serie iQ-R de MELSEC, en todas sus versiones, permite que un atacante remoto no autenticado inicie sesión en un módulo de CPU objetivo obteniendo credenciales distintas de la contraseña"}],"metrics":{"cvssMetricV31":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-319"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r08sfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"66D3AC7B-50E0-47D5-B0D1-07329D724EFE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r08sfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"B185323A-C9E3-48A0-AD28-DA7AC7846E18"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r16sfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"AA81D5C7-46C8-4F0E-9550-D240DC0366F3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r16sfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"C4BBE066-33C4-4410-85D3-4B77B3773330"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r32sfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"7FB53D61-6C69-4A4A-92B1-C10D0B8F0EC9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r32sfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"6F6304BE-DAEE-49AB-B0B1-CEE6878CBECE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r120sfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"8218130C-4E7D-4FB9-976B-2351977C82D4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r120sfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"515BDC46-5A1C-4A94-816A-B4751BB1B58D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r08psfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"5A63D33D-302A-428C-986F-FC3F83CE9C86"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r08psfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"EA37F2FC-8F75-4FEA-882D-87AD5CC1558E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r16psfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"FFB42739-E503-44B2-A020-0DB2B8791A81"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r16psfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"17AD5875-B7D7-498B-9484-23049753133E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r32psfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"3B1F532B-8EAF-4E66-9AF5-5EEFF5A0BC23"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r32psfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"0EC2594C-6067-40BA-B8B2-AEC9B9C7922F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mitsubishielectric:r120psfcpu_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"B2C03EA2-34BF-4F86-A19C-2818788E092B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mitsubishielectric:r120psfcpu:-:*:*:*:*:*:*:*","matchCriteriaId":"CA3FB3E1-D7D3-424B-A207-D3C6F4365D12"}]}]}],"references":[{"url":"https://jvn.jp/vu/JVNVU98578731","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-287-03","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-011_en.pdf","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":["Vendor Advisory"]},{"url":"https://jvn.jp/vu/JVNVU98578731","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-21-287-03","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-011_en.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}