Mitsubishi Electric Air Conditioning Systems (Update B)
Mitsubishi Electric air conditioning system controllers (AE, EW, TE, TW, G, GB, EB, and AG series) contain an authentication bypass vulnerability (CWE-306). An unauthenticated attacker on the network can bypass authentication controls to gain unauthorized access, modify system settings, or extract firmware. Twelve product models support patching to version 8.03 or later. Ten product models (G-50, G-50-W, G-50A, GB-50 series, G-150AD, AG-150A series, EB-50GU series, and CMS-RMD-J) will not be patched and require network isolation as the primary mitigation.
- Network access to the air conditioning system's management interface (typically TCP port 80 or 443)
- No valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cb78ccb6-7ad3-4755-a3d3-04bce352e4f1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.