Sploit.io - Search

Product: l26cpu-bt, version: < xxxxx26041

CVE-2024-0802

Severity: CRITICAL

Description: Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to read arbitrary information from a target product or execute malicious code on a target product by sending a specially crafted packet.

CVSS Score: 9.8

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000450000
  • Percentile: 0.174380000
  • Date: 2025-01-02

ExploitDB

No data available.

HackerOne Data

  • Rank: 7431
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDECPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q10UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q20UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q50UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q100UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L02CPU - Versions: The first 5 digits of serial No. "26041" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L06CPU - Versions: The first 5 digits of serial No. "26041" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L26CPU - Versions: The first 5 digits of serial No. "26041" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L02CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L06CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-BT - Versions: The first 5 digits of serial No. "26041" and prior
    • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-PBT - Versions: The first 5 digits of serial No. "26041" and prior

    References:

    Risk Assessment

    1. Risk Assessment
    The CVE-2024-0802 vulnerability is a critical issue affecting Mitsubishi Electric Corporation's MELSEC-Q Series and MELSEC-L Series CPU modules. It involves an Incorrect Pointer Scaling flaw that allows a remote, unauthenticated attacker to read arbitrary information or execute malicious code by sending a specially crafted packet. The CVSS v3.1 base score of 9.8 (CRITICAL) underscores the severity of this vulnerability, with high impacts on confidentiality, integrity, and availability.

    The likelihood of exploitation is high due to the low attack complexity and the absence of required privileges or user interaction. Attackers can exploit this vulnerability over a network, making it accessible to a wide range of threat actors. The potential business impact is severe, as successful exploitation could lead to unauthorized access to sensitive data, disruption of industrial processes, and even complete system compromise. This could result in operational downtime, financial losses, and reputational damage for organizations relying on these systems.

    2. Potential Attack Scenarios
    A potential attack scenario involves an attacker targeting a vulnerable Mitsubishi MELSEC-Q Series CPU module in an industrial control system (ICS) environment. The attacker crafts a malicious packet designed to exploit the Incorrect Pointer Scaling vulnerability and sends it to the target device over the network. Since no authentication is required, the attacker can directly interact with the device.

    Upon successful exploitation, the attacker gains the ability to read sensitive information stored on the device, such as configuration data or operational parameters. Alternatively, the attacker could execute arbitrary code, potentially taking full control of the device. This could lead to manipulation of industrial processes, disruption of operations, or even physical damage to equipment. For example, in a manufacturing plant, an attacker could alter production line settings, causing defective products or halting production entirely.

    3. Mitigation Recommendations
    Immediate action is required to mitigate this vulnerability. Organizations using affected Mitsubishi MELSEC-Q Series and MELSEC-L Series CPU modules should apply the latest firmware updates provided by Mitsubishi Electric Corporation. These updates address the Incorrect Pointer Scaling issue and prevent exploitation.

    Additionally, organizations should implement network segmentation to isolate critical industrial control systems from untrusted networks. Restricting access to these devices through firewalls and access control lists can reduce the attack surface. Monitoring network traffic for unusual patterns or unauthorized access attempts is also recommended to detect potential exploitation.

    Relevant resources for mitigation include the Mitsubishi Electric Corporation advisory (https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf) and the CISA ICS advisory (https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14).

    4. Executive Summary
    CVE-2024-0802 is a critical vulnerability affecting Mitsubishi Electric's MELSEC-Q and MELSEC-L Series CPU modules, allowing remote attackers to read sensitive data or execute malicious code without authentication. With a CVSS score of 9.8, this vulnerability poses a significant risk to industrial control systems, potentially leading to operational disruptions, financial losses, and reputational damage.

    Attackers can exploit this vulnerability easily over the network, making it a high-priority issue for organizations using these devices. Immediate mitigation actions, such as applying firmware updates and implementing network security measures, are essential to protect against potential attacks. Addressing this vulnerability is crucial to maintaining the integrity, availability, and confidentiality of industrial systems and ensuring business continuity.

    CVE-2024-0803

    Severity: CRITICAL

    Description: Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

    CVSS Score: 9.8

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.000450000
    • Percentile: 0.174380000
    • Date: 2025-01-02

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 7431
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDECPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q10UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q20UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q50UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q100UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L02CPU - Versions: The first 5 digits of serial No. "26041" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L06CPU - Versions: The first 5 digits of serial No. "26041" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L26CPU - Versions: The first 5 digits of serial No. "26041" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L02CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L06CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-BT - Versions: The first 5 digits of serial No. "26041" and prior
      • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-PBT - Versions: The first 5 digits of serial No. "26041" and prior

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability identified as CVE-2024-0803 is a critical integer overflow or wraparound issue affecting Mitsubishi Electric Corporation's MELSEC-Q and MELSEC-L Series CPU modules. With a CVSS score of 9.8, this vulnerability is classified as critical due to its potential to allow remote code execution without authentication. The attack vector is network-based, requiring no user interaction or privileges, making it highly exploitable.

      The likelihood of exploitation is significant, as the vulnerability can be leveraged by sending a specially crafted packet to the target device. This could lead to complete compromise of the affected systems, resulting in loss of confidentiality, integrity, and availability. The business impact is severe, particularly for organizations relying on these industrial control systems (ICS) for critical operations. A successful exploit could disrupt industrial processes, cause operational downtime, and potentially lead to safety incidents.

      2. Potential Attack Scenarios
      An attacker could exploit this vulnerability by crafting a malicious packet designed to trigger the integer overflow condition in the affected CPU modules. The attack process would involve the following steps:
      - The attacker identifies a target system running a vulnerable version of the MELSEC-Q or MELSEC-L Series CPU module.
      - The attacker sends a specially crafted packet over the network to the target device.
      - The packet exploits the integer overflow vulnerability, causing the system to execute arbitrary code provided by the attacker.
      - Once the code is executed, the attacker gains full control over the device, potentially disrupting industrial processes, exfiltrating sensitive data, or deploying additional malware.

      The potential outcomes include operational disruption, data theft, and even physical damage to industrial equipment if the attacker manipulates control systems.

      3. Mitigation Recommendations
      Immediate action is required to mitigate this vulnerability. Organizations should:
      - Apply the latest firmware updates provided by Mitsubishi Electric Corporation for the affected MELSEC-Q and MELSEC-L Series CPU modules. The updates can be found at the following link: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf.
      - Restrict network access to the affected devices by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks.
      - Monitor network traffic for unusual patterns or attempts to send specially crafted packets to the devices.
      - Conduct a thorough risk assessment to identify and prioritize vulnerable systems for patching or replacement.

      For additional guidance, refer to the following resources:
      - Mitsubishi Electric's advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf
      - JVN vulnerability report: https://jvn.jp/vu/JVNVU99690199/
      - CISA ICS advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14

      4. Executive Summary
      CVE-2024-0803 is a critical vulnerability affecting Mitsubishi Electric's MELSEC-Q and MELSEC-L Series CPU modules, allowing remote attackers to execute malicious code without authentication. This poses a significant risk to industrial control systems, potentially leading to operational disruption, data breaches, and safety incidents.

      The vulnerability is highly exploitable, requiring only network access to the target device. Organizations using affected systems must take immediate action to apply firmware updates, restrict network access, and monitor for suspicious activity. Failure to address this vulnerability could result in severe business impacts, including downtime, financial losses, and reputational damage. Addressing this issue is urgent to ensure the continued security and reliability of critical industrial operations.

      CVE-2024-1915

      Severity: CRITICAL

      Description: Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

      CVSS Score: 9.8

      Priority

      B

      CISA Data

      EPSS Data

      • EPSS: 0.000450000
      • Percentile: 0.174770000
      • Date: 2025-01-04

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 7435
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDECPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q10UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q20UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q50UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q100UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L02CPU - Versions: The first 5 digits of serial No. "26041" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L06CPU - Versions: The first 5 digits of serial No. "26041" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L26CPU - Versions: The first 5 digits of serial No. "26041" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L02CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L06CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-BT - Versions: The first 5 digits of serial No. "26041" and prior
        • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-PBT - Versions: The first 5 digits of serial No. "26041" and prior

        References:

        Risk Assessment

        1. Risk Assessment
        The CVE-2024-1915 vulnerability is a critical issue affecting Mitsubishi Electric Corporation's MELSEC-Q and MELSEC-L Series CPU modules. It involves an Incorrect Pointer Scaling flaw that allows a remote, unauthenticated attacker to execute arbitrary code by sending a specially crafted packet. The CVSS v3.1 base score of 9.8 (CRITICAL) underscores the severity of this vulnerability, with high impacts on confidentiality, integrity, and availability.

        The nature of this vulnerability makes it highly exploitable due to its low attack complexity, lack of required privileges, and absence of user interaction. Attackers can exploit this flaw over the network, making it accessible to anyone with network access to the affected devices. The potential business impact is significant, as successful exploitation could lead to full system compromise, disruption of industrial processes, data theft, or even physical damage in critical infrastructure environments.

        The likelihood of exploitation is high, given the widespread use of these devices in industrial control systems (ICS) and the criticality of the systems they manage. The ease of exploitation further increases the risk, as attackers do not need advanced skills or insider access to exploit this vulnerability.

        2. Potential Attack Scenarios
        A potential attack scenario involves an attacker targeting a manufacturing facility that uses vulnerable MELSEC-Q or MELSEC-L Series CPU modules. The attacker scans the facility's network for exposed devices and identifies a vulnerable CPU module. Using publicly available tools or custom scripts, the attacker crafts a malicious packet designed to exploit the Incorrect Pointer Scaling vulnerability.

        The attacker sends the crafted packet to the target device over the network. Upon successful exploitation, the attacker gains the ability to execute arbitrary code on the device. This could allow the attacker to disrupt the manufacturing process, steal sensitive operational data, or deploy ransomware to lock the system. In a worst-case scenario, the attacker could manipulate the device to cause physical damage to equipment or endanger worker safety.

        The potential outcomes include operational downtime, financial losses, reputational damage, and regulatory penalties. In critical infrastructure sectors, such as energy or water treatment, the consequences could extend to public safety and national security.

        3. Mitigation Recommendations
        Immediate action is required to mitigate the risks associated with CVE-2024-1915. Organizations using affected MELSEC-Q and MELSEC-L Series CPU modules should apply the latest firmware updates provided by Mitsubishi Electric Corporation. The vendor has released patches addressing this vulnerability, and updating to the latest firmware version is the most effective mitigation.

        If patching is not immediately feasible, organizations should implement network segmentation to isolate affected devices from untrusted networks. Additionally, access control lists (ACLs) should be configured to restrict network traffic to trusted IP addresses only. Monitoring network traffic for unusual patterns or attempted exploits is also recommended.

        For further guidance, refer to the following resources:
        - Mitsubishi Electric's security advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf
        - CISA's advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14
        - JVN vulnerability report: https://jvn.jp/vu/JVNVU99690199/

        4. Executive Summary
        CVE-2024-1915 is a critical vulnerability affecting Mitsubishi Electric's MELSEC-Q and MELSEC-L Series CPU modules, allowing remote attackers to execute malicious code without authentication. This flaw poses a significant risk to industrial control systems, with potential impacts including operational disruption, data theft, and physical damage.

        The vulnerability is highly exploitable due to its low complexity and network accessibility, making it a prime target for attackers. Organizations using affected devices must take immediate action to mitigate risks by applying vendor-provided patches and implementing network security measures.

        Failure to address this vulnerability could result in severe financial, operational, and reputational consequences, particularly in critical infrastructure sectors. Proactive mitigation is essential to safeguard systems, protect business continuity, and ensure public safety.

        CVE-2024-1916

        Severity: CRITICAL

        Description: Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

        CVSS Score: 9.8

        Priority

        B

        CISA Data

        EPSS Data

        • EPSS: 0.000450000
        • Percentile: 0.174770000
        • Date: 2025-01-04

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 7435
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        GitHub PoCs

          Nuclei Templates

          No data available.

          VulnCheck Data

          Affected Products:

          • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDECPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q10UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q20UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q50UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q100UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L02CPU - Versions: The first 5 digits of serial No. "26041" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L06CPU - Versions: The first 5 digits of serial No. "26041" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L26CPU - Versions: The first 5 digits of serial No. "26041" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L02CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L06CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-BT - Versions: The first 5 digits of serial No. "26041" and prior
          • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-PBT - Versions: The first 5 digits of serial No. "26041" and prior

          References:

          Risk Assessment

          1. Risk Assessment
          The CVE-2024-1916 vulnerability is a critical integer overflow or wraparound issue affecting Mitsubishi Electric Corporation's MELSEC-Q and MELSEC-L Series CPU modules. With a CVSS score of 9.8, this vulnerability is highly severe and poses a significant risk to organizations using these devices. The vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the target system by sending a specially crafted packet.

          The likelihood of exploitation is high due to the low attack complexity and the absence of required privileges or user interaction. Attackers can exploit this vulnerability over the network, making it accessible to anyone with network access to the affected devices. The potential impacts are severe, including complete compromise of confidentiality, integrity, and availability. Attackers could disrupt industrial processes, steal sensitive data, or cause physical damage to systems controlled by these modules.

          2. Potential Attack Scenarios
          An attacker could exploit this vulnerability by crafting a malicious packet designed to trigger the integer overflow condition. The attack process would involve the following steps:
          - The attacker identifies a target system running an affected MELSEC-Q or MELSEC-L Series CPU module.
          - The attacker sends a specially crafted packet to the target device over the network.
          - The packet triggers the integer overflow, allowing the attacker to execute arbitrary code on the device.
          - Once code execution is achieved, the attacker could install malware, disrupt operations, or exfiltrate sensitive data.

          The potential outcomes of such an attack include operational downtime, data breaches, and even physical damage to industrial systems, depending on the role of the compromised device in the industrial process.

          3. Mitigation Recommendations
          Immediate action is required to mitigate this vulnerability. Organizations should:
          - Apply the latest firmware updates provided by Mitsubishi Electric Corporation for the affected MELSEC-Q and MELSEC-L Series CPU modules. Refer to the vendor advisory for detailed instructions: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf.
          - Restrict network access to the affected devices by implementing strict firewall rules and network segmentation. Ensure that only authorized systems can communicate with the devices.
          - Monitor network traffic for unusual patterns or attempts to exploit this vulnerability. Use intrusion detection systems (IDS) or security information and event management (SIEM) tools to detect potential attacks.
          - Conduct a thorough risk assessment to identify all affected devices and prioritize patching based on criticality.

          4. Executive Summary
          CVE-2024-1916 is a critical vulnerability affecting Mitsubishi Electric Corporation's MELSEC-Q and MELSEC-L Series CPU modules. It allows remote attackers to execute malicious code without authentication, posing significant risks to industrial systems. Exploitation could lead to operational disruptions, data breaches, and physical damage.

          The vulnerability is easy to exploit and has a high likelihood of being targeted by attackers. Immediate action is required to mitigate the risk. Organizations should apply firmware updates, restrict network access, and monitor for suspicious activity. Addressing this vulnerability is critical to maintaining the security and reliability of industrial control systems. Failure to act could result in severe business impacts, including financial losses and reputational damage.

          CVE-2024-1917

          Severity: CRITICAL

          Description: Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

          CVSS Score: 9.8

          Priority

          B

          CISA Data

          EPSS Data

          • EPSS: 0.000450000
          • Percentile: 0.174770000
          • Date: 2025-01-04

          ExploitDB

          No data available.

          HackerOne Data

          • Rank: 7435
          • Reports submitted count: 0
          • Unknown: 0
          • None: 0
          • Low: 0
          • Medium: 0
          • High: 0
          • Critical: 0

          GitHub PoCs

            Nuclei Templates

            No data available.

            VulnCheck Data

            Affected Products:

            • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDECPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q10UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q20UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q50UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q100UDEHCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q04UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q06UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q13UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-Q Series Q26UDPVCPU - Versions: The first 5 digits of serial No. "26061" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L02CPU - Versions: The first 5 digits of serial No. "26041" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L06CPU - Versions: The first 5 digits of serial No. "26041" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L26CPU - Versions: The first 5 digits of serial No. "26041" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L02CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L06CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-P - Versions: The first 5 digits of serial No. "26041" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-BT - Versions: The first 5 digits of serial No. "26041" and prior
            • Mitsubishi Electric Corporation MELSEC-L Series L26CPU-PBT - Versions: The first 5 digits of serial No. "26041" and prior

            References:

            Risk Assessment

            1. Risk Assessment
            The CVE-2024-1917 vulnerability is a critical integer overflow or wraparound issue affecting Mitsubishi Electric Corporation's MELSEC-Q and MELSEC-L Series CPU modules. With a CVSS score of 9.8, this vulnerability is classified as critical due to its potential for remote code execution without authentication. The attack vector is network-based, requiring no user interaction or privileges, making it highly exploitable. The vulnerability allows an attacker to send a specially crafted packet to the target device, leading to arbitrary code execution. This could result in complete compromise of the affected systems, impacting confidentiality, integrity, and availability. The likelihood of exploitation is high due to the ease of crafting malicious packets and the widespread use of these industrial control systems (ICS) in critical infrastructure. The business impact could be severe, including operational disruption, data theft, and potential safety risks in industrial environments.

            2. Potential Attack Scenarios
            An attacker could exploit this vulnerability by crafting a malicious network packet designed to trigger the integer overflow condition in the affected CPU modules. The attacker would send this packet to the target device over the network, exploiting the lack of input validation in the firmware. Once the overflow is triggered, the attacker could execute arbitrary code on the device, gaining full control over the system. This could allow the attacker to manipulate industrial processes, exfiltrate sensitive data, or disrupt operations entirely. For example, in a manufacturing environment, an attacker could alter production lines, cause equipment damage, or halt operations, leading to significant financial losses and safety hazards. The attack could be conducted remotely, making it difficult to trace the source and increasing the risk of widespread impact.

            3. Mitigation Recommendations
            Immediate action is required to mitigate this vulnerability. Organizations using affected Mitsubishi Electric CPU modules should apply the latest firmware updates provided by the vendor. The vendor has released patches addressing this issue, and these should be installed as soon as possible. Additionally, organizations should implement network segmentation to isolate critical systems and restrict access to affected devices. Monitoring network traffic for unusual patterns or unauthorized access attempts is also recommended. For further guidance, refer to the vendor's advisory at https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf and the CISA advisory at https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-14. Regular security assessments and penetration testing should be conducted to identify and address potential vulnerabilities in industrial control systems.

            4. Executive Summary
            CVE-2024-1917 is a critical vulnerability in Mitsubishi Electric's MELSEC-Q and MELSEC-L Series CPU modules, allowing remote attackers to execute malicious code without authentication. This poses a significant risk to industrial control systems, potentially leading to operational disruption, data breaches, and safety hazards. The vulnerability is highly exploitable due to its network-based attack vector and lack of required privileges. Immediate action is essential to mitigate this risk. Organizations should apply vendor-provided patches, implement network segmentation, and monitor for suspicious activity. Addressing this vulnerability is crucial to safeguarding critical infrastructure and ensuring business continuity. The potential impact on operations and safety underscores the urgency of taking proactive measures to secure affected systems.