Mitsubishi Electric Factory Automation Engineering Products
Mitsubishi Electric factory automation engineering software products are vulnerable to arbitrary code execution when processing specially crafted files. The vulnerability affects a broad range of tools including GX Works2/3, GT Designer (all versions), MX Component, RT ToolBox, MELFA-Works, CC-Link utilities, and many others. An attacker who can trick a user into opening a malicious file on a Windows machine running one of these tools could execute arbitrary code with the privileges of the logged-in user. The CVSS score is 8.3 with high impact on confidentiality, integrity, and availability. This is a follow-up to the original advisory published in August 2020; the list of affected products has expanded significantly, and no vendor patches are currently available.
- User must open a malicious file on a Windows machine running one of the affected Mitsubishi engineering tools
- Attacker must craft a file that triggers the vulnerability (high complexity)
- Engineering workstation must have network access to factory automation devices (PLCs, motion controllers, I/O boards) for lateral movement
Patching may require device reboot — plan for process interruption
/api/v1/advisories/68d848b8-27e3-4db5-9f75-57562b63f04b