Critical Vulnerabilities Found in Mitsubishi Electric Modules
Basically, hackers can crash certain Mitsubishi devices by sending too many messages.
Mitsubishi Electric's MELSEC modules have critical vulnerabilities that could allow hackers to crash devices. This affects users in critical manufacturing sectors. Immediate updates and security measures are essential to prevent disruptions. Stay vigilant and protect your operations.
What Happened
A serious security flaw has been discovered in Mitsubishi Electric's MELSEC iQ-F Series EtherNet/IP and Ethernet modules. This vulnerability could let attackers remotely crash these devices by bombarding them with UDP packets?. If exploited, this could lead to a denial-of-service? (DoS) condition, disrupting operations in critical manufacturing sectors worldwide.
The affected products include the FX5-ENET/IP Ethernet Module (version 1.106 and below) and the FX5-EIP EtherNet/IP Module (all versions). These vulnerabilities, identified as CVE?-2026-1874 and CVE?-2026-1875, highlight significant weaknesses in the control flow and resource management of these devices. With the potential for widespread impact, users need to act quickly to protect their systems.
Why Should You Care
If you use Mitsubishi Electric's MELSEC modules in your manufacturing processes, this vulnerability could put your operations at risk. Imagine your factory's machinery suddenly stopping because of a cyber attack. This isn't just an inconvenience; it could lead to financial losses and operational downtime.
Every day, these devices help manage critical infrastructure. If they go down, it affects not only production but also safety and reliability. Your company's reputation and bottom line could be on the line, making it essential to address these vulnerabilities immediately.
What's Being Done
Mitsubishi Electric is aware of the situation and has released a fix for the FX5-ENET/IP module. Users should:
- Update to version 1.107 or later if you're using the FX5-ENET/IP module.
- Implement mitigations like using firewall?s and VPN?s to limit unauthorized access.
- Restrict physical access to affected devices and connected PCs.
- Install anti-virus software on PCs that interact with these modules.
Experts are closely monitoring the situation for any further developments or additional vulnerabilities that could arise. It's crucial to stay informed and proactive in protecting your devices.
CISA Advisories