ICONICS GENESIS64 and Mitsubishi Electric MC Works64 OPC UA
Successful exploitation of a stack overflow vulnerability in the OPC UA interface of ICONICS GENESIS64, MobileHMI, AnalytiX, Hyper Historian and Mitsubishi Electric MC Works64 could trigger application crashes. An attacker with network access to the OPC UA port (default 4840) of an affected device can send a crafted message to cause a denial of service. GENESIS64 versions 10.97.1 and later are not vulnerable. Other affected products have no fix available and rely on network isolation and firewall protections.
- Network access to the OPC UA port (default 4840) of an affected ICONICS or Mitsubishi Electric device
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9efe46a9-e8da-4593-8133-b26ea4d847d8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.