CVE-2024-1915

9.8 CRITICAL

📋 TL;DR

A remote code execution vulnerability in Mitsubishi Electric MELSEC-Q and MELSEC-L Series CPU modules allows unauthenticated attackers to execute arbitrary malicious code by sending specially crafted packets. This affects industrial control systems using these programmable logic controllers, potentially compromising critical infrastructure operations.

💻 Affected Systems

Products:
  • Mitsubishi Electric MELSEC-Q Series CPU modules
  • Mitsubishi Electric MELSEC-L Series CPU modules
Versions: All versions prior to the patched versions specified in vendor advisory
Operating Systems: Embedded firmware on PLCs
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Q and L series CPU modules; vulnerability exists in the communication protocol handling

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to physical damage, production shutdowns, safety system manipulation, or data exfiltration from operational technology networks.

🟠

Likely Case

Disruption of industrial processes, unauthorized control of machinery, data manipulation, or lateral movement into corporate IT networks from OT environments.

🟢

If Mitigated

Limited impact if systems are air-gapped with proper network segmentation, though risk remains from insider threats or compromised maintenance systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote unauthenticated exploitation via network packets; CVSS 9.8 indicates trivial exploitation with high impact

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Mitsubishi Electric advisory 2023-024 for specific firmware versions

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-024_en.pdf

Restart Required: Yes

Instructions:

1. Download updated firmware from Mitsubishi Electric support portal. 2. Backup current configuration and program. 3. Apply firmware update following vendor instructions. 4. Restart PLC. 5. Verify functionality.

🔧 Temporary Workarounds

Network segmentation and firewall rules

all

Isolate PLCs from untrusted networks using firewalls and VLANs

Disable unnecessary network services

all

Turn off unused communication protocols and ports on PLCs

🧯 If You Can't Patch

  • Implement strict network access controls allowing only trusted IP addresses to communicate with PLCs
  • Deploy intrusion detection systems monitoring for anomalous traffic patterns to PLCs

🔍 How to Verify

Check if Vulnerable:

Check firmware version against vulnerable versions listed in Mitsubishi advisory 2023-024

Check Version:

Use Mitsubishi GX Works3 or similar engineering software to read CPU module firmware version

Verify Fix Applied:

Verify firmware version matches patched versions in vendor advisory and test communication functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to PLC ports
  • Multiple failed connection attempts followed by successful connection
  • Anomalous packet patterns to PLC communication ports

Network Indicators:

  • Malformed packets to PLC communication ports (typically TCP/UDP ports used by MELSEC protocol)
  • Traffic from unexpected source IPs to PLCs
  • Unusual payload sizes in PLC communications

SIEM Query:

source_ip NOT IN (trusted_ips) AND dest_port IN (plc_ports) AND protocol IN (tcp, udp)

🔗 References

📤 Share & Export