CVE-2022-25161

8.6 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to cause a denial-of-service condition in affected Mitsubishi Electric MELSEC iQ-F series PLCs by sending specially crafted packets. The attack disrupts program execution or communication, requiring a system reset for recovery. Organizations using these specific PLC models with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Mitsubishi Electric MELSEC iQ-F series FX5U
  • Mitsubishi Electric MELSEC iQ-F series FX5UC
  • Mitsubishi Electric MELSEC iQ-F series FX5UJ
  • Mitsubishi Electric MELSEC iQ-F series FX5S
Versions: FX5U/FX5UC: versions prior to 1.270 (serial 17X****+) or prior to 1.073 (serial 179****); FX5UJ: versions prior to 1.030/1.031; FX5S: version 1.000
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specific model variants affected as detailed in CVE description. Serial number ranges also determine vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical industrial processes are halted, requiring physical system reset and potentially causing production downtime, safety incidents, or equipment damage.

🟠

Likely Case

PLC stops executing control logic, halting industrial processes until manual reset is performed, causing operational disruption.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated control network segments.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible if PLCs are directly internet-accessible.
🏢 Internal Only: MEDIUM - Requires network access but no authentication, so internal attackers or malware could exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Remote unauthenticated attack with specially crafted packets.

No public exploit code identified, but vulnerability details are public and exploitation appears straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FX5U/FX5UC: 1.270 or later (serial 17X****+) or 1.073 or later (serial 179****); FX5UJ: 1.030/1.031 or later; FX5S: no patch available (only version 1.000 exists)

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-004_en.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Mitsubishi Electric website. 2. Connect to PLC via programming software. 3. Backup current program. 4. Apply firmware update. 5. Restart PLC. 6. Restore program and verify operation.

🔧 Temporary Workarounds

Network segmentation

all

Isolate PLCs in dedicated control network segments with firewall rules restricting access.

Access control lists

all

Implement network ACLs to restrict which IP addresses can communicate with PLCs.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PLCs from untrusted networks
  • Deploy intrusion detection systems monitoring for anomalous traffic to PLCs

🔍 How to Verify

Check if Vulnerable:

Check PLC model, serial number, and firmware version via Mitsubishi Electric programming software (GX Works3).

Check Version:

Use GX Works3 'Diagnostics' -> 'System Monitor' to view firmware version

Verify Fix Applied:

Confirm firmware version is patched via programming software and test communication resilience.

📡 Detection & Monitoring

Log Indicators:

  • PLC error logs showing communication faults
  • Unexpected PLC stop/reset events

Network Indicators:

  • Unusual traffic patterns to PLC ports
  • Malformed packets targeting PLC IP addresses

SIEM Query:

source_ip=* dest_ip=PLC_IP AND (packet_size_anomaly OR protocol_violation)

🔗 References

📤 Share & Export