Mitsubishi Electric Alert
2614Warning Date
Severity Level
Warning Number
Target Sector
27 July, 2022
● Medium
2022-5067
All
Description:
Mitsubishi Electric has released security updates to address a vulnerability in the following products:
- MELSEC iQ-R Series R00/01/02CPU: Firmware Versions 24 and prior
- MELSEC iQ-R Series R04/08/16/32/120(EN)CPU: Firmware Versions 57 and prior
- MELSEC iQ-R Series R08/16/32/120SFCPU: All versions
- MELSEC iQ-R Series R08/16/32/120PCPU: Firmware Versions 29 and prior
- MELSEC iQ-R Series R08/16/32/120PSFCPU: Firmware Versions 08 and prior
- MELSEC iQ-R Series R16/32/64MTCPU: Operating system software Versions 23 and prior
---------- Begin Update D Part 1 of 4 ----------
- MELSEC iQ-R Series R12CCPU-V: Firmware Versions 16 and prior
---------- End Update D Part 1 of 4 ----------
- MELSEC iQ-R Series R12CCPU-V: All versions
- MELSEC Q Series Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: The first 5 digits of serial No. 23121 and prior
- MELSEC Q Series Q03/04/06/13/26UDVCPU: The first 5 digits of serial No. 23071 and prior
- MELSEC Q Series Q04/06/13/26UDPVCPU: The first 5 digits of serial No. 23071 and prior
- MELSEC Q Series Q12DCCPU-V, Q24DHCCPU-V(G), Q24/26DHCCPU-LS: The first 5 digits of serial No. 24031 and prior
- MELSEC Q Series MR-MQ100: Operating system software version F and prior
- MELSEC Q Series Q172/173DCPU-S1: Operating system software version W and prior
- MELSEC Q Series Q172/173DSCPU: All versions
- MELSEC Q Series Q170MCPU: Operating system software version W and prior
- MELSEC Q Series Q170MSCPU(-S1): All versions
- MELSEC L Series L02/06/26CPU(-P), L26CPU-(P)BT: The first 5 digits of serial No. 23121 and prior
- MELIPC Series MI5122-VW: All versions
---------- Begin Update D Part 2 of 4 ----------
- MELIPC Series MI5122-VW: Firmware Versions 05 and prior
---------- End Update D Part 2 of 4 ----------
Threats:
An attacker could exploit this vulnerability by triggering a Denial of Service (DoS) attack.
Best practice and Recommendations:
The CERT team encourages users to apply the necessary updates by using the following link: