Mitsubishi Electric FA Engineering Software (Update C)
Mitsubishi Electric FA Engineering Software contains multiple vulnerabilities in credential storage, authentication, and access control that allow unauthorized users to access MELSEC iQ-R/F/L series CPU modules, OPC UA server modules, and view/execute programs or project files without permission. Affected software includes GX Works3, GX Works2, GX Developer, GT Designer3 Version1, MT Works2, MX OPC UA Module Configurator-R, and Motion Control Settings. Vulnerabilities stem from hardcoded credentials, cleartext password storage, insufficient input validation, and weak security key management.
- Network access to engineering workstation or OPC UA server port (port 4840 or higher for OPC UA)
- No valid user credentials required for initial file/key extraction from workstation filesystem
- Knowledge of Mitsubishi MELSEC project file structure and security key formats
- Physical or network access to host machine where software runs
Patching may require device reboot — plan for process interruption
/api/v1/advisories/86b8218a-4c97-4c6a-b0ac-348761b084f5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.