Mitsubishi Electric has a fix available to handle an incorrect default permissions vulnerability in its MI5122-VW, according to a report with CISA.

Successful exploitation of this vulnerability, which Mitsubishi Electric self-reported, could allow an attacker to tamper with, destroy, disclose, or delete information in the product, or cause a denial-of-service (DoS) condition on the product.

The following versions of Mitsubishi Electric MELIPC Series MI5122-VW, an industrial PC, suffer from the issue: Firmware versions “05” up to and including “07.”

In the vulnerability, in Mitsubishi Electric MELIPC Series MI5122-VWA firmware versions “05” up to and including “07,” a local attacker may execute arbitrary code by saving a malicious file to a specific folder. As a result, the attacker may disclose, tamper with, destroy or delete information in the product, or cause a denial-of-service (DoS) condition on the product.

CVE-2024-3904 is the case number for this vulnerability, which has a CVSS v3.1 base score of 8.8.

Schneider Bold

The product sees use mainly in the critical manufacturing sector, and on a global basis.

No known exploit targets this vulnerability. This vulnerability is not exploitable remotely. However, an attacker could leverage this low complexity vulnerability.

Mitsubishi Electric has fixed the vulnerability in the following products: MI5122-VW, firmware versions “08” or later.

Users employing the affected product should take workarounds and mitigations in Mitsubishi Electric advisory 2024-003, because updating the product to the fixed version is not available.

Refer to Mitsubishi Electric’s user manual for how to check the firmware version.

MELIPC MI5000 Series User’s Manual (Startup) “Appendix 17 Checking Production Information and Firmware Version”

The manuals for Mitsubishi products are available for download on the Mitsubishi Electric’s website.

ISSSource

Pin It on Pinterest

Share This