Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics Products
A command injection vulnerability exists in Mitsubishi Electric ICONICS GENESIS64, ICONICS Suite, MobileHMI, and MC Works64 that allows local users with valid credentials to execute arbitrary system commands on the workstation. The vulnerability is triggered through user interaction with the affected application (such as clicking a malicious link or opening a crafted file). Successful exploitation could result in denial-of-service, information disclosure, and manipulation of data on the compromised workstation. MC Works64 has no planned fix; users are advised to upgrade to GENESIS64 v10.97.3 or higher.
- Local or physical access to the affected workstation
- Valid user account credentials on the workstation
- User interaction (user clicks malicious link or opens crafted file)
- Affected software (GENESIS64 versions ≤10.97.2_CFR_3, ICONICS Suite ≤10.97.2_CFR_3, or MobileHMI ≤10.97.2_CFR_3) installed and running
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a50017fb-51b4-45f8-9360-574f1c907129Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.