Mitsubishi Electric CC-Link IE TSN Industrial Managed Switch
Act Now2.7ICS-CERT ICSA-24-158-03Jun 6, 2024
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary
The Mitsubishi Electric CC-Link IE TSN Industrial Managed Switch (models NZ2MHG-TSNT8F2 and NZ2MHG-TSNT4) contains a resource exhaustion vulnerability (CWE-770) in the web service. An authenticated attacker with high privilege can trigger a temporary denial-of-service condition affecting the switch's web management interface.
What this means
What could happen
An attacker with administrative access could temporarily disrupt the web management interface of the switch, preventing operators from remotely monitoring or reconfiguring network settings during the outage. Physical process operations would continue, but remote management and visibility would be unavailable.
Who's at risk
Energy and manufacturing sectors using Mitsubishi Electric CC-Link IE TSN Industrial Managed Switches (NZ2MHG-TSNT8F2 and NZ2MHG-TSNT4) for network infrastructure. These switches are commonly deployed in water treatment facilities, power distribution systems, and factory automation networks to provide industrial-grade network connectivity.
How it could be exploited
An attacker must first gain valid administrative credentials for the web interface (either by obtaining them or exploiting default credentials if not changed). They then trigger a resource exhaustion condition through the web service, causing a temporary DoS that blocks the management interface from accepting new connections or requests.
Prerequisites
- Valid administrative credentials for the web interface of the switch
- Network access to the web management port (typically port 80/443)
- Access to trigger resource exhaustion in the web service
High EPSS score (92%)Remotely exploitableRequires administrative authenticationNo patch available for affected versionsDefault credentials may exist
Exploitability
High exploit probability (EPSS 92.0%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
NZ2MHG-TSNT8F2: <=05≤ 0506 or later
NZ2MHG-TSNT4: <=05≤ 0506 or later
Remediation & Mitigation
0/4
Do now
0/3HARDENINGChange default username and password on the web management interface immediately after accessing the switch
HARDENINGSet and enforce proper access control permissions for all user accounts with web management access
HARDENINGRestrict network access to the web management interface to authorized engineering workstations only using firewall rules or network segmentation
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate firmware to version 06 or later on both NZ2MHG-TSNT8F2 and NZ2MHG-TSNT4 switches via the web interface (System > System Management > Firmware Upgrade)
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/d7d92230-736d-4e84-b6ae-fdf997a1efef