Mitsubishi Electric Multiple Factory Automation Products (Update A)
A TCP SYN Flood vulnerability exists in the Ethernet communication stack of Mitsubishi Electric factory automation products. Successful exploitation causes a temporary denial-of-service condition in network communication, preventing the device from responding to legitimate commands. Affected products include MELSEC iQ-R/iQ-L/iQ-F series PLCs and CPU modules, motion controller modules, CC-Link IE TSN network and remote I/O modules, FR-series inverter drives, and MR-series servo drives. All versions of all affected products are vulnerable. Mitsubishi Electric does not plan to release a fixed version.
- Network access to the device's Ethernet port (port 502 for CC-Link IE TSN, standard industrial Ethernet ports for others)
- No authentication required - the attack works at the network layer before credentials are checked
Patching may require device reboot — plan for process interruption
/api/v1/advisories/24a04189-12bf-471e-bc34-dca4f675bc7fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.