Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update C)
A file permission vulnerability exists in Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric products including GENESIS64, GENESIS32, ICONICS Suite, Hyper Historian, AnalytiX, MobileHMI, and MC Works64. The vulnerability stems from insufficient file system access controls (CWE-276). An attacker with local user access could read sensitive configuration files, modify operational parameters, or cause denial of service. Successful exploitation could result in disclosure of confidential information, data tampering, or service disruption. Mitsubishi Electric indicates security updates are in development but has not released patches for any affected product versions as of this advisory.
- Local user account on the system running GENESIS64, ICONICS Suite, Hyper Historian, AnalytiX, or MobileHMI
- No elevated privileges required to exploit file permission weakness
- Physical or remote access to the host system (RDP, physical terminal)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b89e5ab9-63d1-4bf2-8bc6-3ddc6d9d984fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.