Mitsubishi Electric MELSEC iQ-R Series (Update C)
This vulnerability is a resource handling flaw (CWE-400) in Mitsubishi Electric MELSEC iQ-R Series controllers. Successful exploitation causes a denial-of-service condition that makes the affected controller unresponsive. The affected products include multiple CPU module variants (R00/01/02CPU, R04/08/16/32/120(EN)CPU, R08/16/32/120SFCPU, R08/16/32/120PCPU, R08/16/32/120PSFCPU) and network gateway modules (RJ71EN71, RJ71GF11-T2, RJ72GF15-T2, RJ71GP21-SX, RJ71GP21S-SX, RJ71GN11-T2). Note that RJ71C24(-R2/R4) has no available patch. The vulnerability has a CVSS score of 7.5 and is not currently being actively exploited in the wild.
- Network access to the affected Mitsubishi iQ-R controller on port 502 (Modbus) or native Mitsubishi port 8000
- No authentication required to send the malicious packet
- Attacker must know or discover the controller's network address
Patching may require device reboot — plan for process interruption
/api/v1/advisories/400d95e9-b901-4ceb-ae9f-adcc39be2c6bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.