Mitsubishi Electric CNC Series - Vulnerability Alert Issued
Basically, a flaw in Mitsubishi machines could let hackers crash them remotely.
A vulnerability has been identified in the Mitsubishi Electric CNC Series, allowing remote attackers to cause a denial-of-service. Affected products include several models. Immediate updates and mitigation strategies are essential to protect operations.
The Flaw
Mitsubishi Electric has reported a significant vulnerability affecting its CNC Series products. This flaw, identified as CVE-2025-2399, involves improper validation of specified index, position, or offset in input. If exploited, it could lead to an out-of-bounds read, causing a denial-of-service condition. This means that attackers could potentially disrupt the normal operations of the affected machines.
The vulnerability affects several models, including M800VW, M800VS, M80V, and others, particularly those with versions labeled as BB or FM. The risk is particularly concerning for industries relying on these machines for critical manufacturing processes.
What's at Risk
The affected products are widely used in critical manufacturing sectors across the globe. A successful attack could halt production, leading to significant financial losses and operational downtime. The vulnerability allows attackers to send specially crafted packets to TCP port 683, which can trigger the denial-of-service condition.
Organizations utilizing these CNC machines should assess their systems to determine if they are running the vulnerable versions. The impact of this vulnerability could extend beyond mere operational disruptions, potentially affecting supply chains and customer commitments.
Patch Status
Mitsubishi Electric has acknowledged the vulnerability and is urging users to update their systems to fixed versions. For models like M800VW and M800VS, users should upgrade to version BC or later. Similarly, for M800W and M800S, the fixed version is FN or later. Users are advised to contact their Mitsubishi Electric representative for guidance on applying these updates.
For those unable to update immediately, Mitsubishi Electric recommends several mitigation strategies. These include using firewalls, VPNs, and IP filters to restrict unauthorized access. Additionally, restricting physical access to the machines and ensuring that antivirus software is installed on connected PCs can help minimize risks.
Immediate Actions
Organizations should take immediate steps to address this vulnerability. First, verify if your CNC machines are among the affected models. If they are, prioritize updating to the recommended fixed versions. If an update cannot be applied promptly, implement the suggested mitigation strategies to protect your systems.
- Use firewalls and VPNs to limit internet exposure.
- Restrict access from untrusted networks through firewalls.
- Employ IP filters where applicable to prevent unauthorized access.
- Limit physical access to the machines to safeguard against potential exploits.
By taking these actions, organizations can significantly reduce the risk posed by this vulnerability and maintain the integrity of their manufacturing processes.
CISA Advisories