Mitsubishi Electric MELSEC iQ-F Series
Multiple Mitsubishi Electric MELSEC iQ-F series PLCs are vulnerable to remote information disclosure, denial of service, and operational disruption via specially crafted packets. The vulnerability exists across all firmware versions of the FX5UC, FX5UJ, FX5U, and FX5S product lines (over 80 specific models listed). An attacker with network access to an unprotected PLC can trigger the vulnerability without authentication or user interaction. Mitsubishi Electric has not released and does not plan to release a firmware patch for any affected model. Mitigation requires network isolation, firewall rules, and enabling the PLC's built-in IP Filter function to restrict access to trusted hosts only.
- Network access to the affected PLC on ports used by MELSEC communication protocols (typically Ethernet, port 502 or proprietary MELSEC ports)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e7ad6816-0306-48b5-8bbe-de26210485d3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.