Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1875: CWE-404 Improper Resource Shutdown or Release in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP

0
High
VulnerabilityCVE-2026-1875cvecve-2026-1875cwe-404
Published: Tue Mar 03 2026 (03/03/2026, 06:54:20 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP

Description

CVE-2026-1875 is a high-severity vulnerability affecting all versions of Mitsubishi Electric's MELSEC iQ-F Series FX5-EIP EtherNet/IP Module. The flaw involves improper resource shutdown or release (CWE-404), allowing a remote attacker to cause a denial-of-service (DoS) by continuously sending UDP packets to the device. Exploitation requires no authentication or user interaction and can lead to a system reset to recover the device. This vulnerability impacts industrial control systems relying on these modules, potentially disrupting critical automation processes. No known exploits are currently reported in the wild. Organizations using these modules should prioritize network-level protections and monitor for abnormal UDP traffic to mitigate risk.

AI-Powered Analysis

AILast updated: 03/03/2026, 07:17:36 UTC

Technical Analysis

CVE-2026-1875 identifies a vulnerability in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5-EIP EtherNet/IP Module, which is widely used in industrial automation environments. The vulnerability is classified as CWE-404, indicating improper resource shutdown or release. Specifically, the device fails to properly handle continuous UDP packet traffic, leading to resource exhaustion or malfunction that causes the system to enter a denial-of-service (DoS) state. Recovery from this state requires a manual system reset, which interrupts normal operations. The vulnerability affects all versions of the FX5-EIP module and can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v4.0 base score is 8.7, reflecting high severity due to network attack vector, low complexity, no privileges or user interaction needed, and a high impact on availability. Although no public exploits have been reported yet, the critical nature of industrial control systems and the ease of exploitation make this a significant threat. The vulnerability could be leveraged to disrupt manufacturing lines, critical infrastructure, or other automated processes relying on these modules, potentially causing operational downtime and safety risks.

Potential Impact

The primary impact of CVE-2026-1875 is a denial-of-service condition on Mitsubishi MELSEC iQ-F FX5-EIP modules, which are integral components in industrial automation and control systems. Organizations worldwide that depend on these modules for process control could experience unexpected system resets, leading to operational interruptions, production downtime, and potential safety hazards. In critical infrastructure sectors such as manufacturing, energy, and utilities, such disruptions could cascade into broader operational failures or safety incidents. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. While no known exploits exist currently, the vulnerability's simplicity and severity make it a prime target for threat actors aiming to disrupt industrial environments. Recovery requires manual intervention, which may delay restoration of normal operations and increase incident response costs. Additionally, repeated exploitation attempts could degrade hardware or firmware stability over time.

Mitigation Recommendations

To mitigate CVE-2026-1875, organizations should implement network segmentation to isolate MELSEC iQ-F FX5-EIP modules from untrusted networks, minimizing exposure to unsolicited UDP traffic. Deploying strict firewall rules to block or rate-limit UDP packets directed at these modules can prevent exploitation attempts. Continuous network monitoring and anomaly detection should be employed to identify unusual UDP traffic patterns indicative of an attack. Since no patches are currently available, organizations should engage with Mitsubishi Electric for updates or advisories and plan for timely firmware updates once released. Implementing redundant systems or failover mechanisms can reduce operational impact during a DoS event. Additionally, physical security controls and access restrictions to industrial control networks will help reduce the attack surface. Incident response plans should include procedures for rapid system resets and recovery to minimize downtime. Finally, educating operational technology (OT) personnel about this vulnerability and its indicators will enhance preparedness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2026-02-04T04:09:48.429Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a687b5d1a09e29cbe1300a

Added to database: 3/3/2026, 7:03:17 AM

Last enriched: 3/3/2026, 7:17:36 AM

Last updated: 3/3/2026, 8:03:59 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses