Mitsubishi Electric GX Works2
GX Works2 contains a vulnerability that allows attackers with local access to open project files protected by user authentication and obtain or modify project information. The vulnerability exploits disclosed credential information to bypass password protection on engineering projects. This is not remotely exploitable; an attacker must have interactive access to the workstation. Mitsubishi Electric has not released a patch and states a fixed version is under development. Until patched, administrators must implement network and physical access controls to prevent unauthorized local access to engineering workstations.
- Local or remote interactive access to the workstation running GX Works2
- User-level privileges on the Windows system
- Access to the GX Works2 application or its project file storage
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0a1d7a4a-9fff-47df-94e8-41ac3f1006d5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.