Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric HMI SCADA (Update B)
Multiple critical vulnerabilities exist in Mitsubishi Electric ICONICS and Hyper Historian HMI/SCADA software and Mitsubishi Electric MC Works64. These vulnerabilities include cross-site scripting (CWE-79), improper input validation (CWE-184), storage of sensitive information in plaintext (CWE-256), and buffer over-read issues (CWE-126). Successful exploitation could result in unauthorized access to sensitive information, unauthorized changes to GENESIS64 and MC Works64 functionality, or denial of service through SQL Server disabling in GENESIS64, ICONICS Suite, MC Works64, or GENESIS32.
- Network access to the ICONICS or Mitsubishi Electric HMI/SCADA application web interface or API
- No credentials required for initial exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d60bdad4-7df9-4e12-b897-eed1b0193a3eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.