Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU
Mitsubishi Electric smartRTU and INEA ME-RTU devices (firmware versions earlier than 3.3) contain multiple vulnerabilities including command injection (CWE-78), improper access control (CWE-284), cross-site scripting (CWE-79), hardcoded credentials (CWE-798), and weak privilege separation. These allow an attacker to gain remote code execution on the device without authentication, extract stored credentials, and use those credentials to access other connected RTUs and control systems. Known public exploits exist for these vulnerabilities.
- Network access to the smartRTU or INEA ME-RTU device (direct or via compromised network segment)
- Device running firmware version earlier than 3.3
- No authentication required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fb580699-f706-4d6a-8d52-2f65aa55481dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.