Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

ICS-CERT Warns of Mitsubishi MX SCADA Vulnerability

ICS-CERT has issued a warning this week after vulnerability details concerning Mitsubishi’s MX Component started to gain attention online.

The MX Component is an Active X control library that supports all communication paths from the PC to the PLC. Last month, a researcher released Proof-of-Concept code that would enable an attacker to open a shell on port 5500.

ICS-CERT has issued a warning this week after vulnerability details concerning Mitsubishi’s MX Component started to gain attention online.

The MX Component is an Active X control library that supports all communication paths from the PC to the PLC. Last month, a researcher released Proof-of-Concept code that would enable an attacker to open a shell on port 5500.

The targeted DLL file (ActUWzd.dll) was shipped with CitectScada (now known as Schneider Electric) products, but it is unknown if it is still used. However, older installations will be vulnerable.

Critical Infrastructure Security

“ICS-CERT is aware of a public report of a heap-based buffer overflow vulnerability with proof-of-concept (PoC) exploit code affecting Mitsubishi MX, a supervisory control and data acquisition/human-machine interface (SCADA/HMI) product,” the CERT advisory (PDF) explains. 

“According to this report, the vulnerability is exploitable when an attacker provides specially crafted input. This report was released without coordination with either the vendor or ICS-CERT. ICS-CERT has notified the affected vendor of the report and has asked the vendor to confirm the vulnerability and identify mitigations.”

Currently, there is no fix available and Mitsubishi hasn’t issued any statements regarding the CERT advisory. The code itself, and additional details on the vulnerability can be seen here.

The OSVDB summary is here.

It is unknown if the vulnerability details have been used in an attack. ICS-CERT advises that organizations minimize network exposure for all control systems, and ensure that remote access to devices that must be connected to a network be properly secured.

Advertisement. Scroll to continue reading.

Related Reading: Critical Infrastructure is the New Battleground for Cyber Security

Related Reading: SCADA Honeypots Shed Light on Attacks Against Critical Infrastructure

Related ReadingPutting SCADA Protection on the Radar

Related Reading: ICS-CERT Examines 3 Years of Data to Reveal Common Vulnerabilities for Critical Asset Owners

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...