Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1874: CWE-670 Always-Incorrect Control Flow Implementation in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP

0
High
VulnerabilityCVE-2026-1874cvecve-2026-1874cwe-670
Published: Tue Mar 03 2026 (03/03/2026, 06:46:21 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP

Description

Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP versions 1.106 and prior and Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 17:23:46 UTC

Technical Analysis

CVE-2026-1874 identifies a critical vulnerability in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5-ENET/IP Ethernet Module (versions 1.106 and earlier) and all versions of the FX5-EIP EtherNet/IP Module. The vulnerability stems from an Always-Incorrect Control Flow Implementation (CWE-670), which means the device's internal control flow logic does not correctly handle certain network inputs, specifically UDP packets. An attacker can exploit this flaw remotely by sending a continuous stream of UDP packets to the affected modules, causing them to enter an erroneous state that leads to a denial-of-service condition. This DoS manifests as the device becoming unresponsive and requiring a manual or automated system reset to restore normal operation. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction needed, and a high impact on availability. The affected products are industrial Ethernet communication modules widely used in Mitsubishi Electric's MELSEC iQ-F Series programmable logic controllers (PLCs), which are integral components in industrial automation and control systems. No patches or mitigations are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability's root cause is a flawed control flow implementation that mishandles UDP packet processing, leading to system instability and forced resets.

Potential Impact

The primary impact of CVE-2026-1874 is a denial-of-service condition on critical industrial Ethernet modules used in automation and control environments. Organizations relying on Mitsubishi Electric's MELSEC iQ-F Series PLCs for manufacturing, utilities, or infrastructure control could experience unexpected downtime, disrupting production lines, process controls, or critical infrastructure operations. The forced system reset required to recover from the DoS may lead to operational delays, safety risks, and financial losses. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can launch attacks from anywhere on the network or potentially from the internet if the devices are exposed. This increases the risk of targeted attacks or opportunistic disruptions by threat actors. Although no known exploits are currently reported, the high CVSS score and ease of exploitation make this a significant threat to industrial control system (ICS) environments worldwide. The availability impact is high, while confidentiality and integrity are not directly affected. The vulnerability could also be leveraged as part of a larger attack chain to disrupt industrial processes.

Mitigation Recommendations

1. Network Segmentation: Isolate MELSEC iQ-F Series FX5-ENET/IP and FX5-EIP modules on dedicated, secure industrial networks with strict access controls to limit exposure to untrusted networks. 2. Firewall and Filtering: Implement firewall rules to block or rate-limit unsolicited UDP traffic directed at the affected modules, especially from external or less trusted network segments. 3. Monitoring and Alerting: Deploy network monitoring solutions to detect unusual spikes or continuous UDP traffic targeting these modules and trigger alerts for investigation. 4. Vendor Coordination: Engage with Mitsubishi Electric for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 5. Incident Response Planning: Prepare procedures to quickly reset affected devices safely and restore operations if a DoS condition occurs. 6. Access Control: Restrict network access to the modules to authorized personnel and systems only, using VPNs or secure remote access methods. 7. Physical Security: Ensure physical access to the devices is controlled to prevent local exploitation or tampering. 8. Regular Audits: Conduct periodic security assessments of industrial control networks to identify and remediate exposure to this and similar vulnerabilities. These measures go beyond generic advice by focusing on network-level protections and operational readiness specific to industrial Ethernet modules.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2026-02-04T04:08:41.166Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a687b5d1a09e29cbe13006

Added to database: 3/3/2026, 7:03:17 AM

Last enriched: 3/10/2026, 5:23:46 PM

Last updated: 4/17/2026, 8:49:10 AM

Views: 159

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses