Mitsubishi Electric FA products (Update A)
Mitsubishi Electric FA products—including MELSEC-F series (FX3G, FX3U, FX3S, FX3UC, FX3SA, FX3GA, FX3GE, FX3GC), MELSEC iQ-F series (FX5U, FX5UC, FX5UJ, FX5S, FX5 SSC), MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series CPUs and motion modules, and Mitsubishi CNC controllers (M800V/M80V and M800/M80/E80 series)—contain an input validation vulnerability (CWE-306) that allows an unauthenticated remote attacker to send specially crafted network packets and execute arbitrary commands on the PLC or CNC controller. All versions of each model are affected. The vulnerability requires only network access to the controller's Ethernet interface and carries a CVSS score of 10.0 (critical) with complete impact on confidentiality, integrity, and availability. No vendor firmware patch is available for any affected product.
- Network access to the Ethernet port of the PLC or CNC controller
- Device must be reachable from attacker's network segment
- No authentication required
/api/v1/advisories/85f44f39-d399-47dd-961a-3a9d38698ac5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.