ICSA-20-212-02_Mitsubishi Electric Multiple Factory Automation Engineering Software Products (Update A)
A vulnerability in multiple Mitsubishi Electric factory automation engineering software products allows arbitrary code execution when a user opens a specially crafted file. The vulnerability affects 33 products spanning PLC configuration tools (GX Works2/3), robot programming (MELFA-Works), motion control tools (RT ToolBox), communication middleware (MX Component), and network utility software. Most products are end-of-life with no patches available; Mitsubishi recommends installing a patched version of GX Works2, GX Works3, or MELSOFT Navigator in the same folder as mitigation, running tools under non-admin accounts, isolating engineering networks, and using antivirus software.
- User interaction required: engineer must open or process a malicious file in one of the affected tools
- The affected Mitsubishi software tool must be installed on the workstation
- Non-interactive exploitation possible if file is processed by batch scripts or automated workflows
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3a26f368-5c26-4e61-8576-955bd3219e7f