Mitsubishi Electric Air Conditioning System
The vulnerability is an authentication bypass or improper authorization check in Mitsubishi Electric air conditioning centralized controllers and expansion controllers. An attacker with valid login credentials can impersonate an administrator to view and modify system configuration, operation information, and settings without proper authorization verification. Affected products include the G-50A, GB-50A, AG-150A-A/J, GB-50ADA-A/J, EB-50GU-A/J, AE-200A/E, AE-50A/E, EW-50A/E, TE-200A, TE-50A, TW-50A, CMS-RMD-J centralized controllers and PAC-YG50ECA expansion controller. CWE-303 (Incorrect Check for Unusual or Suspicious-Looking Source).
- Valid user credentials (username and password) for the air conditioning system management interface
- Network access to the management port of the centralized controller (G-50A, GB-50A, AG-150A, EB-50GU, AE series, EW series, TE series, TW series, GB-50ADA, CMS-RMD-J) or expansion controller (PAC-YG50ECA)
- Ability to reach the device from the network (either local network access or internet exposure if not protected by firewall/VPN)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f5f1c11e-5648-4ada-bc66-c3488b5b7888Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.