Skip to content
  Thursday 22 May 2025
Trending
February 14, 2025<h3>US Critical Infrastructure at Risk Due to CISA Budget Cuts</h3> January 8, 20227 Best Free YouTube Alternatives 2022 – Top Sites Like YouTube July 9, 2024Cybersecurity Engineer – PRN – Internal Only December 20, 2023Adjunct Faculty – Cybersecurity August 3, 2024SME Cybersecurity Specialist May 14, 2024CISA Releases Four Industrial Control Systems Advisories November 20, 2024<h3>Embark on Your Unstructured Data Adventure: Join Our Webinar Now!</h3> April 2, 2024Sam Altman Steps Down as Owner of OpenAI Startup Fund November 13, 2024Global Head of External CyberSecurity Engagement September 18, 2024Cybersecurity Specialist
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Mitsubishi Electric MELSEC Series | CISA
Threat Advisories

Mitsubishi Electric MELSEC Series | CISA

SecuredyouadmSecuredyouadm—November 2, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 9.1
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Mitsubishi Electric Corporation
  • Equipment: MELSEC Series
  • Vulnerability: Insufficient Verification of Data Authenticity

2. RISK EVALUATION

Successful exploitation of this vulnerability may allow a remote attacker to reset the memory of the products to factory default state and cause a denial-of-service condition.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Mitsubishi Electric reports that the following versions of MELSEC-F series programmable controllers are affected if they are used with ethernet communication special adapter FX3U-ENET-ADP or ethernet communication block FX3U-ENET(-L) with the exception of “FX3GE-xMy/z x=24,40, y=T,R, z=ES,ESS,DS,DSS”. Some of these products are sold in limited regions, see the Mitsubishi Electric advisory for details:

  • MELSEC-F series FX3U-xMy/z x=16,32,48,64,80,128, y=T,R, z=ES,ESS,DS,DSS: All versions
  • MELSEC-F series FX3U-32MR/UA1, FX3U-64MR/UA1: All versions
  • MELSEC-F series FX3U-32MS/ES, FX3U-64MS/ES: All versions
  • MELSEC-F series FX3U-xMy/ES-A x=16,32,48,64,80,128, y=T,R: All versions
  • MELSEC-F series FX3UC-xMT/z x=16,32,64,96, z=D,DSS: All versions
  • MELSEC-F series FX3UC-16MR/D-T, FX3UC-16MR/DS-T: All versions
  • MELSEC-F series FX3UC-32MT-LT, FX3UC-32MT-LT-2: All versions
  • MELSEC-F series FX3UC-16MT/D-P4, FX3UC-16MT/DSS-P4: All versions
  • MELSEC-F series FX3G-xMy/z x=14,24,40,60, y=T,R, z=ES,ESS,DS,DSS: All versions
  • MELSEC-F series FX3G-xMy/ES-A x=14,24,40,60, y=T,R: All versions
  • MELSEC-F series FX3GC-32MT/D, FX3GC-32MT/DSS: All versions
  • MELSEC-F series FX3GE-xMy/z x=24,40, y=T,R, z=ES,ESS,DS,DSS: All versions
  • MELSEC-F series FX3GA-xMy-CM x=24,40,60, y=T,R: All versions
  • MELSEC-F series FX3S-xMy/z x=10,14,20,30, y=T,R, z=ES,ESS,DS,DSS: All versions
  • MELSEC-F series FX3S-30My/z-2AD y=T,R, z=ES,ESS: All versions
  • MELSEC-F series FX3SA-xMy-CM x=10,14,20,30, y=T,R: All versions
  • MELSEC iQ-F series FX5U-xMy/z x=32,64,80, y=T,R, z=ES,DS,ESS,DSS: All versions
  • MELSEC iQ-F series FX5UC-xMy/z x=32,64,96, y=T, z=D,DSS: All versions
  • MELSEC iQ-F series FX5UC-32MT/DS-TS, FX5UC-32MT/DSS-TS, FX5UC-32MR/DS-TS: All versions
  • MELSEC iQ-F series FX5UJ-xMy/z x=24,40,60, y=T,R, z=ES,ESS,DS,DSS: All versions
  • MELSEC iQ-F series FX5UJ-xMy/ES-A x=24,40,60, y=T,R: All versions
  • MELSEC iQ-F series FX5S-xMy/z x=30,40,60,80, y=T,R, z=ES,ESS: All versions

3.2 Vulnerability Overview

3.2.1 Insufficient Verification of Data Authenticity CWE-345

A denial-of-service vulnerability exists in the MELSEC-F Series main modules and MELSEC iQ-F Series CPU modules. A remote attacker may be able to reset the memory of the products to factory default state and cause a denial-of-service condition on the products by sending specific packets.

More stories

Siemens SIMATIC MV500 | CISA

November 16, 2023

ABB RMC-100 | CISA

April 4, 2025

B&R Automation Runtime | CISA

January 28, 2025

CISA Adds One Known Exploited Vulnerability to Catalog

October 26, 2023

CVE-2023-4699 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Japan

3.4 RESEARCHER

Mitsubishi Electric reported this vulnerability to CISA.

4. MITIGATIONS

Mitsubishi Electric recommends that customers take the following mitigation measures to minimize the risk of exploiting this vulnerability:

  • Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.
  • Use within a LAN and block access from untrusted networks and hosts through firewalls.
  • For MELSEC iQ-F Series, use IP filter function to block access from untrusted hosts. For details on the IP filter function, please refer to the following manual for each product. “12.1 IP Filter Function” in the MELSEC iQ-F FX5 User’s Manual (Ethernet Communication)
  • Restrict physical access to the affected products and the LAN that is connected by them.

For specific update instructions and additional details see the Mitsubishi Electric advisory.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.

5. UPDATE HISTORY

  • November 2, 2023: Initial Publication



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Apache ActiveMQ Vulnerability Exploited by HelloKitty Ransomware Group
Weintek EasyBuilder Pro | CISA
Related posts
  • Related posts
  • More from author
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Threat Advisories

Threat Actors Target U.S. Critical Infrastructure with LummaC2 Malware

May 21, 20250
Threat Advisories

Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

May 21, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability

May 22, 20250
Industry News

Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host

May 22, 20250
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability
  • Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host
  • New Best Practices Guide for Securing AI Data Released
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures