[Control systems] Mitsubishi Electric security advisory

Number: AV19-173
Date: 15 August 2019

On 13 August 2019 a public report was published highlighting vulnerabilities with proof-of-concept (PoC) exploit code affecting smartRTU (Versions 2.02 and prior) and INEA ME-RTU (Versions 3.0 and prior) remote terminal unit products.

Successful exploitation of these vulnerabilities may allow an actor to perform remote code execution and gain root access to the devices.

The Cyber Centre encourages users and administrators to review the ICS-CERT Alert (ICS-ALERT-19-255-01) for recommended mitigations and contact their local Mitsubishi Electric representative for more information.

https://www.us-cert.gov/ics/alerts/ics-alert-19-255-01

https://us.mitsubishielectric.com/fa/en/about-us/distributors

Note to Readers

The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment. We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: