Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update B)
Multiple vulnerabilities in Mitsubishi Electric ICONICS and GENESIS software allow local privilege escalation and arbitrary code execution. CVSS 7.8 (high). Affected products include GENESIS32 (all versions, no fix planned), GENESIS64 (all versions, mitigations in 10.97.3+), ICONICS Suite AlarmWorX64 MMX (all versions, mitigations in 10.97.3+), and MC Works64 (all versions, no fix planned). These vulnerabilities stem from improper handling of library loading and permissions in the engineering/HMI environment, allowing a local attacker to execute code with elevated privileges. GENESIS32 is retired and no longer supported; Mitsubishi Electric recommends migration to GENESIS V11. For newer versions, upgrades to 10.97.3 or later include mitigations; MC Works64 requires implementation of published workarounds.
- Local access to a workstation or engineer console running affected product
- User privileges on the affected system (low privilege sufficient)
- The affected software running on Windows with vulnerable versions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/46f29dff-a297-400b-b083-f999c45a092f