Mitsubishi Electric Factory Automation Products Path Traversal (Update C)
Mitsubishi Electric Factory Automation Products contain a path traversal vulnerability that allows an attacker to read arbitrary files, modify files, or cause denial of service on engineering workstations running affected software. The vulnerability exists in software configuration and development tools including GX Works2, GX Works3, MT Works2, MELSEC iQ-R Motion Module configurator, FR Configurator2, CW Configurator, MI Configurator, MELSOFT Navigator, RT ToolBox3, MR Configurator2, MELSOFT iQ AppPortal, and MX Component.
- User interaction required: engineer must open a malicious file attachment or from untrusted source
- File must be opened in one of the affected software versions
- No special network access required; attack is file-based and local to the workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/25130006-4080-4149-834a-04285d904c46Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.