Mitsubishi Electric MELSEC and MELIPC Series (Update G)
Multiple Mitsubishi Electric MELSEC and MELIPC controllers contain input validation vulnerabilities (CWE-20, CWE-400, CWE-130) that allow remote denial-of-service attacks. A remote attacker with network access to the device can send a malformed packet that causes the controller to become unresponsive, requiring manual reset to restore function. Affected products include MELSEC Q Series (Q03/04/06/10/13/20/26/50/100UDEHCPU, Q03/04/06/13/26UDVCPU, Q04/06/13/26UDPVCPU, Q12DCCPU-V, Q24DHCCPU-V(G), Q24/26DHCCPU-LS, MR-MQ100, Q172/173DCPU-S1, Q172/173DSCPU, Q170MCPU, Q170MSCPU), MELSEC iQ-R Series (R00/01/02/04/08/16/32/120CPU, R08/16/32/120SFCPU, R08/16/32/120PCPU, R08/16/32/120PSFCPU, R16/32/64MTCPU, R12CCPU-V), MELSEC L Series (L02/06/26CPU, L26CPU-BT), and MELIPC MI5122-VW.
- Network access to the PLC Ethernet port (port 502 or similar)
- No authentication required
- Device must be connected to a network reachable by the attacker
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0a21b5a6-5507-429a-ad78-d43224ab4ce9