Mitsubishi Electric FA products (Update A)
Mitsubishi Electric FA products—including MELSEC-F series (FX3G, FX3U, FX3S, FX3UC, FX3SA, FX3GA, FX3GE, FX3GC), MELSEC iQ-F series (FX5U, FX5UC, FX5UJ, FX5S, FX5 SSC), MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series CPUs and motion modules, and Mitsubishi CNC controllers (M800V/M80V and M800/M80/E80 series)—contain an input validation vulnerability (CWE-306) that allows an unauthenticated remote attacker to send specially crafted network packets and execute arbitrary commands on the PLC or CNC controller. All versions of each model are affected. The vulnerability requires only network access to the controller's Ethernet interface and carries a CVSS score of 10.0 (critical) with complete impact on confidentiality, integrity, and availability. No vendor firmware patch is available for any affected product.
- Network access to the Ethernet port of the PLC or CNC controller
- Device must be reachable from attacker's network segment
- No authentication required
/api/v1/advisories/85f44f39-d399-47dd-961a-3a9d38698ac5