CVE-2026-20892

7.2 HIGH

📋 TL;DR

A code injection vulnerability in MR-GM5L-S1 and MR-GM5A-L1 devices allows authenticated administrators to execute arbitrary commands on affected systems. This affects organizations using these specific Mitsubishi Electric industrial automation products. Attackers with administrative access can potentially compromise device integrity and functionality.

💻 Affected Systems

Products:
  • MR-GM5L-S1
  • MR-GM5A-L1
Versions: All versions prior to patched release
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative privileges to exploit. Industrial control systems using these specific Mitsubishi Electric products.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to disruption of industrial processes, data exfiltration, or lateral movement into connected systems.

🟠

Likely Case

Unauthorized command execution by malicious insiders or compromised admin accounts, potentially disrupting device operations.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing unauthorized administrative access.

🌐 Internet-Facing: MEDIUM - If devices are exposed to internet with admin interfaces accessible, risk increases significantly.
🏢 Internal Only: HIGH - Even internally, compromised admin credentials could lead to significant impact on industrial operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires administrative access. Exploitation likely involves injecting commands through vulnerable interfaces.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.mrl.co.jp/download/security/JVNVU98103854.pdf

Restart Required: Yes

Instructions:

1. Review vendor advisory at provided URL. 2. Download and apply firmware updates from Mitsubishi Electric. 3. Restart affected devices. 4. Verify patch application.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to only necessary personnel using principle of least privilege.

Network Segmentation

all

Isolate affected devices in separate network segments with strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for administrative accounts
  • Monitor administrative activity and command execution logs for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against vendor advisory. Devices must be MR-GM5L-S1 or MR-GM5A-L1 models.

Check Version:

Check device web interface or console for firmware version information (vendor-specific commands vary)

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login attempts
  • Unexpected command execution patterns
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from industrial devices
  • Traffic to unexpected ports from affected devices

SIEM Query:

source="industrial_device" AND (event_type="admin_login" OR event_type="command_execution") | stats count by user, command

🔗 References

📤 Share & Export