Mitsubishi Electric MELSEC iQ-R Series Safety CPU and SIL2 Process CPU (Update A)
A vulnerability in Mitsubishi Electric MELSEC iQ-R Series Safety CPU and SIL2 Process CPU allows a non-administrator user with valid credentials to disclose the credentials (user ID and password) of users with lower access levels. This affects all versions of the R08SFCPU, R16SFCPU, R32SFCPU, R120SFCPU (Safety CPU) and R08PSFCPU, R16PSFCPU, R32PSFCPU, R120PSFCPU (SIL2 Process CPU). A mitigation is available when the CPU version meets minimum thresholds and GX Works3 engineering software version is updated to enable enhanced vulnerability management during credential provisioning. For older versions, no patch will be released.
- Valid login credentials for GX Works3 engineering software with at least read access to user database
- Network access to the MELSEC iQ-R CPU (typically on engineering LAN)
- Access to a personal computer with GX Works3 installed that can communicate with the target CPU
- Sufficient privilege level to query user information (non-administrator users can still disclose lower-privilege users' credentials)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/244d633b-9872-4823-83f6-d7f41fc9ee5bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.