Mitsubishi Electric MELSEC iQ-R Series
A vulnerability in the authentication mechanism of Mitsubishi Electric MELSEC iQ-R series Safety and SIL2 Process CPUs allows a remote attacker to obtain credentials and log in to the CPU module. The affected products include Safety CPU models R08/16/32/120SFCPU (firmware ≤26) and SIL2 Process CPU models R08/16/32/120PSFCPU (firmware ≤11). Exploitation could lead to unauthorized access and control of safety-critical and process control logic. Mitsubishi Electric states that updating the affected products to fixed firmware versions is not available, leaving only mitigation measures as interim protection.
- Network connectivity to the CPU module port
- No valid user credentials required for initial exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f92933e7-0131-4003-9e7a-f57d269ce23dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.