CVE-2026-1874: CWE-670 Always-Incorrect Control Flow Implementation in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP
CVE-2026-1874 is a high-severity vulnerability affecting Mitsubishi Electric's MELSEC iQ-F Series FX5-ENET/IP Ethernet Module (versions 1. 106 and prior) and all versions of the FX5-EIP EtherNet/IP Module. The flaw is an Always-Incorrect Control Flow Implementation (CWE-670) that allows a remote attacker to cause a denial-of-service (DoS) by continuously sending UDP packets to the affected modules. Exploitation requires no authentication or user interaction and results in the product requiring a system reset to recover. There are no known exploits in the wild, and no patches have been released yet. This vulnerability poses a significant risk to industrial control systems relying on these modules for network communication. Organizations using these Mitsubishi modules should implement network-level protections and monitor for abnormal UDP traffic to mitigate potential attacks.
AI Analysis
Technical Summary
CVE-2026-1874 identifies a critical vulnerability in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5-ENET/IP Ethernet Module (versions 1.106 and prior) and all versions of the FX5-EIP EtherNet/IP Module. The vulnerability is classified under CWE-670, which pertains to Always-Incorrect Control Flow Implementation, indicating a fundamental flaw in the module's control flow logic. Specifically, the affected modules improperly handle incoming UDP packets, allowing a remote attacker to continuously send such packets and trigger a denial-of-service (DoS) condition. This DoS causes the modules to become unresponsive, necessitating a system reset to restore normal operation. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation (network attack vector, low complexity) and the significant impact on availability. The vulnerability affects critical industrial communication modules used in Mitsubishi's MELSEC iQ-F Series programmable logic controllers (PLCs), which are widely deployed in industrial automation environments. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. The flaw could be leveraged by attackers to disrupt industrial processes, potentially causing operational downtime and safety risks in manufacturing, energy, and infrastructure sectors.
Potential Impact
The primary impact of CVE-2026-1874 is a denial-of-service condition on Mitsubishi MELSEC iQ-F Series Ethernet modules, which are integral components in industrial control systems (ICS). Disruption of these modules can halt communication between PLCs and other networked devices, leading to operational downtime, loss of process control, and potential safety hazards in critical infrastructure environments such as manufacturing plants, energy grids, water treatment facilities, and transportation systems. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale if network access is available. This could enable attackers to cause widespread disruption, especially in environments where these modules are deployed in large numbers or in critical control loops. Additionally, forced system resets may cause temporary loss of monitoring and control data, complicating incident response and recovery. While no known exploits are currently reported, the high CVSS score and ease of attack vector suggest a significant risk if weaponized. The vulnerability could also be leveraged as part of multi-stage attacks targeting industrial environments, increasing the potential for cascading failures.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate network-level mitigations to reduce exposure. This includes segmenting industrial control networks from corporate and external networks using firewalls and network access controls to restrict UDP traffic to only trusted sources. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify unusual UDP packet floods targeting the affected modules. Network administrators should monitor for abnormal UDP traffic patterns and implement rate limiting where feasible. Physical or logical isolation of critical PLCs and their communication modules can further reduce attack surface. Organizations should engage with Mitsubishi Electric for timely updates and patches and plan for prompt deployment once available. Additionally, incident response plans should be updated to include procedures for handling DoS conditions on these modules, including safe system reset protocols. Regular backups of PLC configurations and process data are recommended to facilitate recovery. Finally, consider vendor consultation for potential firmware workarounds or mitigations.
Affected Countries
Japan, United States, Germany, South Korea, China, France, United Kingdom, Italy, Canada, Australia
CVE-2026-1874: CWE-670 Always-Incorrect Control Flow Implementation in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP
Description
CVE-2026-1874 is a high-severity vulnerability affecting Mitsubishi Electric's MELSEC iQ-F Series FX5-ENET/IP Ethernet Module (versions 1. 106 and prior) and all versions of the FX5-EIP EtherNet/IP Module. The flaw is an Always-Incorrect Control Flow Implementation (CWE-670) that allows a remote attacker to cause a denial-of-service (DoS) by continuously sending UDP packets to the affected modules. Exploitation requires no authentication or user interaction and results in the product requiring a system reset to recover. There are no known exploits in the wild, and no patches have been released yet. This vulnerability poses a significant risk to industrial control systems relying on these modules for network communication. Organizations using these Mitsubishi modules should implement network-level protections and monitor for abnormal UDP traffic to mitigate potential attacks.
AI-Powered Analysis
Technical Analysis
CVE-2026-1874 identifies a critical vulnerability in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5-ENET/IP Ethernet Module (versions 1.106 and prior) and all versions of the FX5-EIP EtherNet/IP Module. The vulnerability is classified under CWE-670, which pertains to Always-Incorrect Control Flow Implementation, indicating a fundamental flaw in the module's control flow logic. Specifically, the affected modules improperly handle incoming UDP packets, allowing a remote attacker to continuously send such packets and trigger a denial-of-service (DoS) condition. This DoS causes the modules to become unresponsive, necessitating a system reset to restore normal operation. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation (network attack vector, low complexity) and the significant impact on availability. The vulnerability affects critical industrial communication modules used in Mitsubishi's MELSEC iQ-F Series programmable logic controllers (PLCs), which are widely deployed in industrial automation environments. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. The flaw could be leveraged by attackers to disrupt industrial processes, potentially causing operational downtime and safety risks in manufacturing, energy, and infrastructure sectors.
Potential Impact
The primary impact of CVE-2026-1874 is a denial-of-service condition on Mitsubishi MELSEC iQ-F Series Ethernet modules, which are integral components in industrial control systems (ICS). Disruption of these modules can halt communication between PLCs and other networked devices, leading to operational downtime, loss of process control, and potential safety hazards in critical infrastructure environments such as manufacturing plants, energy grids, water treatment facilities, and transportation systems. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale if network access is available. This could enable attackers to cause widespread disruption, especially in environments where these modules are deployed in large numbers or in critical control loops. Additionally, forced system resets may cause temporary loss of monitoring and control data, complicating incident response and recovery. While no known exploits are currently reported, the high CVSS score and ease of attack vector suggest a significant risk if weaponized. The vulnerability could also be leveraged as part of multi-stage attacks targeting industrial environments, increasing the potential for cascading failures.
Mitigation Recommendations
Given the absence of official patches, organizations should implement immediate network-level mitigations to reduce exposure. This includes segmenting industrial control networks from corporate and external networks using firewalls and network access controls to restrict UDP traffic to only trusted sources. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify unusual UDP packet floods targeting the affected modules. Network administrators should monitor for abnormal UDP traffic patterns and implement rate limiting where feasible. Physical or logical isolation of critical PLCs and their communication modules can further reduce attack surface. Organizations should engage with Mitsubishi Electric for timely updates and patches and plan for prompt deployment once available. Additionally, incident response plans should be updated to include procedures for handling DoS conditions on these modules, including safe system reset protocols. Regular backups of PLC configurations and process data are recommended to facilitate recovery. Finally, consider vendor consultation for potential firmware workarounds or mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2026-02-04T04:08:41.166Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a687b5d1a09e29cbe13006
Added to database: 3/3/2026, 7:03:17 AM
Last enriched: 3/3/2026, 7:17:52 AM
Last updated: 3/3/2026, 8:06:43 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1875: CWE-404 Improper Resource Shutdown or Release in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP
HighCVE-2025-12345: Buffer Overflow in LLM-Claw
HighCVE-2025-15595: CWE-1390: Weak Authentication in mlsoft Inno Setup
MediumCVE-2026-3455: Cross-site Scripting (XSS) in mailparser
MediumCVE-2026-3449: Incorrect Control Flow Scoping in @tootallnate/once
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.