Mitsubishi Electric Multiple Factory Automation Products (Update B)
Mitsubishi Electric factory automation products contain code execution and denial-of-service vulnerabilities. Affected products: CC-Link IE TSN Industrial Managed Switch (firmware versions ≤03), GOT2000 compatible HMI software (Version 1.275M), and MELSEC iQ-R Series OPC UA Server Module (firmware versions ≤08). Exploitation requires only network access and no credentials. Successful attacks could enable arbitrary code execution or crash services, disrupting production operations and data exchange between control devices.
- Network access to the affected Mitsubishi Electric device (port varies by product: web interface for switch, network connectivity for HMI and OPC UA server)
- No credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/de945c92-2da3-4d52-9eef-ae53bce32bebGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.