Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8403: CWE-1287 Improper Validation of Specified Type of Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET

0
High
VulnerabilityCVE-2024-8403cvecve-2024-8403cwe-1287
Published: Tue Nov 19 2024 (11/19/2024, 05:57:17 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC iQ-F Series FX5-ENET

Description

CVE-2024-8403 is a high-severity vulnerability affecting Mitsubishi Electric MELSEC iQ-F Series FX5-ENET and FX5-ENET/IP modules, versions 1. 100 to 1. 200 and 1. 104 respectively. The flaw arises from improper validation of input types in SLMP packets, allowing remote attackers to cause a denial of service (DoS) by disrupting Ethernet communications. Exploitation requires no authentication or user interaction and can be performed over the network. While no known exploits are currently reported in the wild, the vulnerability poses a significant risk to industrial control systems relying on these modules. The impact is limited to availability, with no direct confidentiality or integrity compromise. Mitigation requires applying vendor patches once available and implementing network segmentation and strict filtering of SLMP traffic. Countries with significant industrial automation deployments using Mitsubishi PLCs, such as Japan, United States, Germany, South Korea, China, and others, are most at risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 04:53:23 UTC

Technical Analysis

CVE-2024-8403 identifies a vulnerability in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5-ENET and FX5-ENET/IP modules, specifically versions 1.100 to 1.200 and 1.100 to 1.104 respectively. The vulnerability is classified under CWE-1287, which pertains to improper validation of specified input types. The affected devices process SLMP (Seamless Message Protocol) packets for Ethernet communication. Due to insufficient validation of the input type in these packets, a remote attacker can craft malicious SLMP packets that cause the device to enter a denial of service state, effectively disrupting Ethernet communication. This disruption can halt communication between the PLC and other networked devices or control systems, potentially impacting industrial processes. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity primarily due to the ease of exploitation and the impact on availability. No known public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may rely on vendor updates in the near future. The vulnerability affects critical industrial control hardware widely used in manufacturing and automation sectors, underscoring the importance of addressing this issue promptly to maintain operational continuity.

Potential Impact

The primary impact of CVE-2024-8403 is a denial of service condition affecting Ethernet communication of Mitsubishi MELSEC iQ-F Series FX5-ENET modules. This can lead to loss of connectivity between programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems or other networked industrial devices. Such disruptions can halt or degrade industrial processes, causing production downtime, safety risks, and financial losses. Since these PLCs are often integral to critical infrastructure and manufacturing environments, the availability impact can cascade into broader operational failures. Although confidentiality and integrity are not directly compromised, the loss of availability in industrial control systems can indirectly affect safety and reliability. The ease of remote exploitation without authentication increases the threat level, especially in environments where these devices are exposed to untrusted networks or insufficiently segmented industrial networks. Organizations relying on these Mitsubishi PLCs in sectors like manufacturing, energy, transportation, and utilities could face significant operational risks if this vulnerability is exploited.

Mitigation Recommendations

1. Monitor Mitsubishi Electric communications for official patches or firmware updates addressing CVE-2024-8403 and apply them promptly once available. 2. Implement strict network segmentation to isolate industrial control systems and PLCs from general IT networks and the internet, reducing exposure to remote attacks. 3. Deploy network-level filtering to block or restrict unauthorized SLMP protocol traffic, especially from untrusted sources. 4. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous or malformed SLMP packets that could indicate exploitation attempts. 5. Conduct regular security audits and vulnerability assessments of industrial control networks to identify and remediate exposure points. 6. Establish incident response plans specific to industrial control system disruptions to minimize downtime and ensure rapid recovery. 7. Limit access to PLC management interfaces to trusted personnel and secure communication channels with encryption and authentication where possible. 8. Maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2024-09-04T02:53:48.367Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cb4fb9e6bfc5ba1dc69fe3

Added to database: 3/31/2026, 4:38:17 AM

Last enriched: 3/31/2026, 4:53:23 AM

Last updated: 3/31/2026, 5:50:17 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses