CVE-2026-1875: CWE-404 Improper Resource Shutdown or Release in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP
CVE-2026-1875 is a high-severity vulnerability affecting all versions of Mitsubishi Electric's MELSEC iQ-F Series FX5-EIP EtherNet/IP Module. The flaw involves improper resource shutdown or release (CWE-404), allowing a remote attacker to cause a denial-of-service (DoS) by continuously sending UDP packets to the device. Exploitation requires no authentication or user interaction and can lead to a system reset to recover the device. This vulnerability impacts industrial control systems relying on these modules, potentially disrupting critical automation processes. No known exploits are currently reported in the wild. Organizations using these modules should prioritize network-level protections and monitor for abnormal UDP traffic to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-1875 identifies a vulnerability in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5-EIP EtherNet/IP Module, which is widely used in industrial automation environments. The vulnerability is classified as CWE-404, indicating improper resource shutdown or release. Specifically, the device fails to properly handle continuous UDP packet traffic, leading to resource exhaustion or malfunction that causes the system to enter a denial-of-service (DoS) state. Recovery from this state requires a manual system reset, which interrupts normal operations. The vulnerability affects all versions of the FX5-EIP module and can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v4.0 base score is 8.7, reflecting high severity due to network attack vector, low complexity, no privileges or user interaction needed, and a high impact on availability. Although no public exploits have been reported yet, the critical nature of industrial control systems and the ease of exploitation make this a significant threat. The vulnerability could be leveraged to disrupt manufacturing lines, critical infrastructure, or other automated processes relying on these modules, potentially causing operational downtime and safety risks.
Potential Impact
The primary impact of CVE-2026-1875 is a denial-of-service condition on Mitsubishi MELSEC iQ-F FX5-EIP modules, which are integral components in industrial automation and control systems. Organizations worldwide that depend on these modules for process control could experience unexpected system resets, leading to operational interruptions, production downtime, and potential safety hazards. In critical infrastructure sectors such as manufacturing, energy, and utilities, such disruptions could cascade into broader operational failures or safety incidents. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. While no known exploits exist currently, the vulnerability's simplicity and severity make it a prime target for threat actors aiming to disrupt industrial environments. Recovery requires manual intervention, which may delay restoration of normal operations and increase incident response costs. Additionally, repeated exploitation attempts could degrade hardware or firmware stability over time.
Mitigation Recommendations
To mitigate CVE-2026-1875, organizations should implement network segmentation to isolate MELSEC iQ-F FX5-EIP modules from untrusted networks, minimizing exposure to unsolicited UDP traffic. Deploying strict firewall rules to block or rate-limit UDP packets directed at these modules can prevent exploitation attempts. Continuous network monitoring and anomaly detection should be employed to identify unusual UDP traffic patterns indicative of an attack. Since no patches are currently available, organizations should engage with Mitsubishi Electric for updates or advisories and plan for timely firmware updates once released. Implementing redundant systems or failover mechanisms can reduce operational impact during a DoS event. Additionally, physical security controls and access restrictions to industrial control networks will help reduce the attack surface. Incident response plans should include procedures for rapid system resets and recovery to minimize downtime. Finally, educating operational technology (OT) personnel about this vulnerability and its indicators will enhance preparedness.
Affected Countries
Japan, United States, Germany, South Korea, China, France, United Kingdom, Italy, Canada, Australia
CVE-2026-1875: CWE-404 Improper Resource Shutdown or Release in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP
Description
CVE-2026-1875 is a high-severity vulnerability affecting all versions of Mitsubishi Electric's MELSEC iQ-F Series FX5-EIP EtherNet/IP Module. The flaw involves improper resource shutdown or release (CWE-404), allowing a remote attacker to cause a denial-of-service (DoS) by continuously sending UDP packets to the device. Exploitation requires no authentication or user interaction and can lead to a system reset to recover the device. This vulnerability impacts industrial control systems relying on these modules, potentially disrupting critical automation processes. No known exploits are currently reported in the wild. Organizations using these modules should prioritize network-level protections and monitor for abnormal UDP traffic to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-1875 identifies a vulnerability in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5-EIP EtherNet/IP Module, which is widely used in industrial automation environments. The vulnerability is classified as CWE-404, indicating improper resource shutdown or release. Specifically, the device fails to properly handle continuous UDP packet traffic, leading to resource exhaustion or malfunction that causes the system to enter a denial-of-service (DoS) state. Recovery from this state requires a manual system reset, which interrupts normal operations. The vulnerability affects all versions of the FX5-EIP module and can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v4.0 base score is 8.7, reflecting high severity due to network attack vector, low complexity, no privileges or user interaction needed, and a high impact on availability. Although no public exploits have been reported yet, the critical nature of industrial control systems and the ease of exploitation make this a significant threat. The vulnerability could be leveraged to disrupt manufacturing lines, critical infrastructure, or other automated processes relying on these modules, potentially causing operational downtime and safety risks.
Potential Impact
The primary impact of CVE-2026-1875 is a denial-of-service condition on Mitsubishi MELSEC iQ-F FX5-EIP modules, which are integral components in industrial automation and control systems. Organizations worldwide that depend on these modules for process control could experience unexpected system resets, leading to operational interruptions, production downtime, and potential safety hazards. In critical infrastructure sectors such as manufacturing, energy, and utilities, such disruptions could cascade into broader operational failures or safety incidents. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. While no known exploits exist currently, the vulnerability's simplicity and severity make it a prime target for threat actors aiming to disrupt industrial environments. Recovery requires manual intervention, which may delay restoration of normal operations and increase incident response costs. Additionally, repeated exploitation attempts could degrade hardware or firmware stability over time.
Mitigation Recommendations
To mitigate CVE-2026-1875, organizations should implement network segmentation to isolate MELSEC iQ-F FX5-EIP modules from untrusted networks, minimizing exposure to unsolicited UDP traffic. Deploying strict firewall rules to block or rate-limit UDP packets directed at these modules can prevent exploitation attempts. Continuous network monitoring and anomaly detection should be employed to identify unusual UDP traffic patterns indicative of an attack. Since no patches are currently available, organizations should engage with Mitsubishi Electric for updates or advisories and plan for timely firmware updates once released. Implementing redundant systems or failover mechanisms can reduce operational impact during a DoS event. Additionally, physical security controls and access restrictions to industrial control networks will help reduce the attack surface. Incident response plans should include procedures for rapid system resets and recovery to minimize downtime. Finally, educating operational technology (OT) personnel about this vulnerability and its indicators will enhance preparedness.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2026-02-04T04:09:48.429Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a687b5d1a09e29cbe1300a
Added to database: 3/3/2026, 7:03:17 AM
Last enriched: 3/3/2026, 7:17:36 AM
Last updated: 3/3/2026, 8:03:59 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1874: CWE-670 Always-Incorrect Control Flow Implementation in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP
HighCVE-2025-12345: Buffer Overflow in LLM-Claw
HighCVE-2025-15595: CWE-1390: Weak Authentication in mlsoft Inno Setup
MediumCVE-2026-3455: Cross-site Scripting (XSS) in mailparser
MediumCVE-2026-3449: Incorrect Control Flow Scoping in @tootallnate/once
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.