Out-of-bounds read vulnerability in GT21 model of GOT2000 series (GT2107-WTBD V01.39.000 and earlier, GT2107-WTSD V01.39.000 and earlier, GT2104-RTBD V01.39.000 and earlier, GT2104-PMBD V01.39.000 and earlier, and GT2103-PMBD V01.39.000 and earlier), GS21 model of GOT series (GS2110-WTBD V01.39.000 and earlier, GS2107-WTBD V01.39.000 and earlier, GS2110-WTBD-N V01.39.000 and earlier, and GS2107-WTBD-N V01.39.000 and earlier), and Tension Controller LE7-40GU-L series (LE7-40GU-L Screen package data for CC-Link IEF Basic V1.00, LE7-40GU-L Screen package data for MODBUS/TCP V1.00, and LE7-40GU-L Screen package data for SLMP V1.00) allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted packet. As a result, deterioration of communication performance or a denial-of-service (DoS) condition of the TCP communication functions of the products may occur.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| mitsubishielectric | gt2107-wtbd_firmware | 01.39.000 | - |
| mitsubishielectric | gt2107-wtsd_firmware | 01.39.000 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10
Affected Products
6
References
mitsubishielectric / gt2107-wtbd_firmware
| - |
| mitsubishielectric | gt2104-rtbd_firmware | 01.39.000 | - |
| mitsubishielectric | gt2104-pmbd_firmware | 01.39.000 | - |
| mitsubishielectric | gt2103-pmbd_firmware | 01.39.000 | - |
| mitsubishielectric | gs2110-wtbd_firmware | 01.39.000 | - |
| mitsubishielectric | gs2107-wtbd_firmware | 01.39.000 | - |
| mitsubishielectric | le7-40gu-l_firmware | - | - |
| mitsubishielectric | gs2110-wtbd-n_firmware | 01.39.000 | - |
| mitsubishielectric | gs2107-wtbd-n_firmware | 01.39.000 | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Exploitability
Impact