CVE-2022-24946

7.5 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to cause denial of service (DoS) conditions in Mitsubishi Electric PLCs and industrial controllers by sending specially crafted packets. Affected systems require a physical reset to recover. The vulnerability impacts multiple MELSEC and MELIPC series products used in industrial automation.

💻 Affected Systems

Products:
  • Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V
  • Mitsubishi Electric MELSEC-Q Series Q03UDECPU
  • Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU
  • Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU
  • Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU
  • Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V
  • Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G)
  • Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS
  • Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P)
  • Mitsubishi Electric MELSEC-L series L26CPU-(P)BT
  • Mitsubishi Electric MELIPC Series MI5122-VW
Versions: See serial number and firmware version restrictions in CVE description
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects specific serial number ranges and firmware versions. Check exact product models against vendor advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of industrial processes requiring physical system reset, potentially causing production downtime, safety incidents, or equipment damage.

🟠

Likely Case

Temporary disruption of Ethernet communications leading to process interruptions until manual reset is performed.

🟢

If Mitigated

Limited impact if systems are isolated in segmented networks with proper access controls.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible from internet-facing systems.
🏢 Internal Only: MEDIUM - Requires network access but no authentication, so internal threats remain significant.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafting malicious packets requires understanding of the protocol but no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Mitsubishi Electric for specific firmware updates

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-007_en.pdf

Restart Required: Yes

Instructions:

1. Contact Mitsubishi Electric support for firmware updates. 2. Schedule maintenance window. 3. Backup configuration. 4. Apply firmware update. 5. Test functionality. 6. Document changes.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices in separate VLANs with strict firewall rules

Access control lists

all

Implement network ACLs to restrict communication to trusted sources only

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access
  • Monitor network traffic for anomalous patterns and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check product model, serial number, and firmware version against vendor advisory specifications

Check Version:

Use Mitsubishi Electric programming software or check device configuration

Verify Fix Applied:

Verify firmware version has been updated beyond vulnerable versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device resets
  • Communication timeouts
  • Ethernet interface errors

Network Indicators:

  • Unusual packet patterns to PLC ports
  • Traffic from untrusted sources to industrial devices

SIEM Query:

Search for: (device_type:plc OR device_type:scada) AND (event_type:reset OR event_type:timeout) AND source_ip NOT IN trusted_networks

🔗 References

📤 Share & Export