Mitsubishi Electric MELSEC iQ-F, iQ-R Series
A vulnerability in the firmware update function of MELSEC iQ-F and iQ-R series PLCs stems from insufficient entropy in random number generation (CWE-337). This allows an attacker with network access to potentially influence the firmware update process and manipulate PLC code or firmware. The vulnerability affects multiple FX5-series compact controllers (FX5U, FX5UC, FX5UJ, FX5S) and R-series CPU modules across several firmware versions. Exploitation requires high attack complexity and network-level access to intercept the update mechanism.
- Network access to the PLC's Ethernet port (port 502 or equivalent Mitsubishi communication port)
- Ability to intercept or influence the firmware update process
- Physical or network proximity to perform cryptographic attacks on the random number generation
- Knowledge of the specific PLC model and firmware update protocol
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cd08d78c-91f1-42d9-9d2c-2f93ab5e5376Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.