Mitsubishi Electric CNC Series (Update B)
Mitsubishi Electric CNC communication software and associated tools contain a DLL loading vulnerability (CWE-427) in the setup launcher. An attacker with local access to an engineering workstation can exploit this by placing a malicious DLL in a location the software searches during startup, causing arbitrary code execution with user privileges. Affected products include M70LC, M730LC, NC Trainer series, NC Monitor series, NC Designer series, NC Analyzer series, NC Explorer, NC Visualizer, Remote Monitor Tool, MS Configurator, and related utilities. Four products have vendor fixes available (NC Trainer2, NC Trainer2 plus, FCSB1224, NC Virtual Simulator); thirteen products will not be patched.
- Local access to engineering workstation running vulnerable software
- Ability to write files to a directory searched by the CNC software (e.g., Windows system paths or application directories)
- User must launch the affected CNC software component
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bb706f91-8c43-41e2-a9ae-f26be6920b32Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.