(I)IoT Security News
ICS, News, Reports, Vulnerabilities

Mitsubishi Electric MELSEC iQ-R, iQ-L Series and MELIPC Series (Update D)

Mitsubishi Electric MELSEC iQ-R, iQ-L Series and MELIPC Series (Update D))

Mitsubishi Electric reports this vulnerability affects the following MELSEC iQ-R, iQ-L series CPU module, and MELIPC series

1. EXECUTIVE SUMMARY

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow a remote attacker to cause a denial-of-service condition in the module’s ethernet communication.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Mitsubishi Electric reports this vulnerability affects the following MELSEC iQ-R, iQ-L series CPU module, and MELIPC series:

3.2 Vulnerability Overview

3.2.1 IMPROPER RESOURCE SHUTDOWN OR RELEASE CWE-404

A denial-of-service vulnerability due to improper resource shutdown or release exists in Mitsubishi Electric MELSEC iQ-R, iQ-L series CPU module, and MELIPC series. This vulnerability could allow a remote attacker to cause a denial-of-service condition in the module’s ethernet communication by sending specially crafted packets.

CVE-2022-33324 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

3.3 BACKGROUND

3.4 RESEARCHER

Mitsubishi Electric reported this vulnerability to CISA.

4. MITIGATIONS

Mitsubishi Electric fixed the following products:

Mitsubishi Electric offers the following countermeasures for users:

Mitsubishi Electric recommends users take mitigation measures to minimize the risk of exploiting this vulnerability:

For specific update instructions and additional details, see Mitsubishi Electric advisory 2022-018.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.

5. UPDATE HISTORY

This product is provided subject to this Notification and this Privacy & Use policy.

Source:

https://www.cisa.gov/news-events/ics-advisories/icsa-22-356-03

Related posts

Philips IntelliVue WLAN

(I) IoT
5 years ago

ABB Asset Suite

(I) IoT
5 years ago

Baxter Sigma Spectrum Infusion Pumps (Update A)

(I) IoT
4 years ago
Exit mobile version