CVE-2024-0802

9.8 CRITICAL

📋 TL;DR

This vulnerability in Mitsubishi Electric MELSEC-Q and L Series CPU modules allows remote unauthenticated attackers to read arbitrary data or execute malicious code by sending specially crafted packets. It affects industrial control systems (ICS) used in critical infrastructure, posing severe risks to operational technology environments.

💻 Affected Systems

Products:
  • Mitsubishi Electric MELSEC-Q Series CPU modules
  • Mitsubishi Electric MELSEC-L Series CPU modules
Versions: Specific versions not detailed in references; check vendor advisory for exact ranges.
Operating Systems: Not applicable; these are PLC firmware vulnerabilities.
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations of the CPU modules; no special settings required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to unauthorized code execution, data theft, and potential disruption of industrial processes, possibly causing physical damage or safety incidents.

🟠

Likely Case

Remote code execution enabling attackers to manipulate PLC logic, steal sensitive operational data, or disrupt manufacturing and control systems.

🟢

If Mitigated

Limited impact if systems are isolated behind firewalls and network segmentation, but risk remains if exposed.

🌐 Internet-Facing: HIGH, as the vulnerability is remotely exploitable without authentication, making exposed systems prime targets for attacks.
🏢 Internal Only: HIGH, because internal networks may still be vulnerable to insider threats or lateral movement if compromised.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves sending crafted packets, which is straightforward given the unauthenticated nature and high CVSS score.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware updates.

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf

Restart Required: Yes

Instructions:

1. Review the vendor advisory for affected versions. 2. Download and apply the latest firmware update from Mitsubishi Electric. 3. Restart the CPU modules to activate the patch. 4. Verify the update using version checks.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected PLCs from untrusted networks to block remote access.

Firewall Rules

all

Implement strict firewall rules to restrict traffic to necessary ports only.

🧯 If You Can't Patch

  • Deploy network-based intrusion detection systems (IDS) to monitor for malicious packets.
  • Enforce physical security and access controls to prevent unauthorized network connections.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version on the CPU module against the vendor advisory; if it matches affected versions, it is vulnerable.

Check Version:

Use the PLC programming software (e.g., GX Works) to read the CPU module firmware version.

Verify Fix Applied:

After patching, confirm the firmware version has been updated to a non-vulnerable release as specified by Mitsubishi Electric.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network traffic patterns or failed connection attempts to PLC ports.

Network Indicators:

  • Anomalous packets targeting the PLC's communication protocols.

SIEM Query:

Example: 'source_ip: external AND dest_port: PLC_port AND protocol: TCP/UDP'

🔗 References

📤 Share & Export