Mitsubishi Electric MELSEC iQ-R Series
The MELSEC iQ-R series controllers have a resource exhaustion vulnerability in their Ethernet communication interface. An attacker can send crafted connection requests to port 5007 (TCP) or the MELSOFT transmission port to exhaust available connection slots, preventing legitimate clients such as engineering workstations and SCADA systems from connecting to the controller. This results in denial of service and loss of visibility and control over the affected process. Mitsubishi Electric has not released a patch for any of the affected CPU models (R08/16/32/120SFCPU, R00/01/02CPU, R08/16/32/120PCPU, R04/08/16/32/120(EN)CPU, R08/16/32/120PSFCPU). If exploited, the connection can be restored by disabling the port with the forced connection invalidation function and then re-enabling it.
- Network access to port 5007 (TCP) or MELSOFT transmission port on the controller
- No authentication required
- Controller must have Ethernet enabled and accessible from the attacker's network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/10f52c64-3989-4171-989f-00ebbdc0ad41