Mitsubishi Electric MELSEC iQ-R, Q, L Series and MELIPC Series (Update C)
A vulnerability in Mitsubishi Electric MELSEC iQ-R, Q, L series and MELIPC series PLCs allows a remote attacker to send a specially crafted Ethernet packet that causes a denial-of-service condition. When exploited, the affected PLC becomes unresponsive to all Ethernet communication and must be manually restarted to restore functionality. The vulnerability is triggered during the Ethernet communication protocol handling and does not require authentication or special configuration. MELSEC iQ-R Series R12CCPU-V firmware versions 16 and earlier are affected. MELSEC Q Series (multiple models) with serial numbers prior to 24062 or 24052 depending on model are affected. MELSEC L Series (L02CPU, L06CPU, L26CPU variants) with serial numbers prior to 24052 are affected. MELIPC MI5122-VW firmware versions 05 and earlier are affected.
- Network access to the Ethernet port of the PLC (port 502 or other configured Modbus TCP port)
- No credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7a972b06-31d6-4b89-a75b-c98d31788fcd