Your review has been sent successfully

Mitsubishi Electric Alert

2614
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

27 July, 2022

● Medium

2022-5067

All

Description:

Mitsubishi Electric has released security updates to address a vulnerability in the following products:

  • MELSEC iQ-R Series R00/01/02CPU: Firmware Versions 24 and prior
  • MELSEC iQ-R Series R04/08/16/32/120(EN)CPU: Firmware Versions 57 and prior
  • MELSEC iQ-R Series R08/16/32/120SFCPU: All versions
  • MELSEC iQ-R Series R08/16/32/120PCPU: Firmware Versions 29 and prior
  • MELSEC iQ-R Series R08/16/32/120PSFCPU: Firmware Versions 08 and prior
  • MELSEC iQ-R Series R16/32/64MTCPU: Operating system software Versions 23 and prior

---------- Begin Update D Part 1 of 4 ----------

  • MELSEC iQ-R Series R12CCPU-V: Firmware Versions 16 and prior

---------- End Update D Part 1 of 4 ----------

  • MELSEC iQ-R Series R12CCPU-V: All versions
  • MELSEC Q Series Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU:  The first 5 digits of serial No. 23121 and prior
  • MELSEC Q Series Q03/04/06/13/26UDVCPU: The first 5 digits of serial No. 23071 and prior
  • MELSEC Q Series Q04/06/13/26UDPVCPU: The first 5 digits of serial No. 23071 and prior
  • MELSEC Q Series Q12DCCPU-V, Q24DHCCPU-V(G), Q24/26DHCCPU-LS: The first 5 digits of serial No. 24031 and prior
  • MELSEC Q Series MR-MQ100: Operating system software version F and prior
  • MELSEC Q Series Q172/173DCPU-S1: Operating system software version W and prior 
  • MELSEC Q Series Q172/173DSCPU: All versions
  • MELSEC Q Series Q170MCPU: Operating system software version W and prior 
  • MELSEC Q Series Q170MSCPU(-S1): All versions
  • MELSEC L Series L02/06/26CPU(-P), L26CPU-(P)BT:  The first 5 digits of serial No. 23121 and prior
  • MELIPC Series MI5122-VW: All versions

---------- Begin Update D Part 2 of 4 ----------

  • MELIPC Series MI5122-VW: Firmware Versions 05 and prior

---------- End Update D Part 2 of 4 ----------

Threats:

An attacker could exploit this vulnerability by triggering a Denial of Service (DoS) attack.

Best practice and Recommendations:

The CERT team encourages users to apply the necessary updates by using the following link:

Last updated at 27 July, 2022

Rate the content

rate-icon
up icon