← Back to home
ICSA-26-078-05  ·  Published 2026-03-19  ·  View on CISA ICS-CERT ↗

Mitsubishi Electric CNC Series

CVSS 5.9 MEDIUM

Risk Summary

Successful exploitation of this vulnerability could allow a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition in the affected products.

CVEs (1)

Remediations

  • Please apply the fixed version (BC or later) for Mitsubishi Electric M800VW(BND-2051W000), M800VS(BND-2052W000), M80V(BND-2053W000), and M80VW(BND-2054W000). For instructions on how to apply it, please consult your Mitsubishi Electric representative.
  • Please apply the fixed version (FN or later) for Mitsubishi Electric M800W(BND-2005W000), M800S(BND-2006W000), M80(BND-2007W000), M80W(BND-2008W000), and E80(BND-2009W000). For instructions on how to apply it, please consult your Mitsubishi Electric representative.
  • For customers of products that do not have a fixed version or who cannot immediately update the product, Mitsubishi Electric recommends using a firewall or virtual private network (VPN) to prevent unauthorized access, when internet access is required, to minimize the risk of exploiting this vulnerability.
  • For customers of products that do not have a fixed version or who cannot immediately update the product, Mitsubishi Electric recommends using the product within a LAN and blocking access from untrusted networks and hosts through a firewall, to minimize the risk of exploiting this vulnerability.
  • For customers of products that do not have a fixed version or who cannot immediately update the product, Mitsubishi Electric recommends using IP filters to prevent unauthorized access, when internet access is required, to minimize the risk of exploiting this vulnerability. IP filter function is available for M800V/M80V Series and M800/M80/E80 Series. For details about the IP filter function, refer to the following manual for each product: M800V/M80V Series Instruction Manual "16. Appendix 3 IP Address Filter Setting Function", M800/M80/E80 Series Instruction Manual "15. Appendix 2 IP Address Filter Setting Function"
  • For customers of products that do not have a fixed version or who cannot immediately update the product, Mitsubishi Electric recommends restricting physical access to the affected product and to all computers and network devices to which the products are connected, to minimize the risk of exploiting this vulnerability.
  • For customers of products that do not have a fixed version or who cannot immediately update the product, Mitsubishi Electric recommends installing anti-virus software on PCs that can access the affected product, to minimize the risk of exploiting this vulnerability.
  • For more information, see Mitsubishi Electric 2025-022. https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-022_en.pdf

Affected Vendors

Mitsubishi Electric

Affected Products (20)

Mitsubishi Electric · M800VW (BND-2051W000) <=BB
Mitsubishi Electric · M800VS (BND-2052W000) <=BB
Mitsubishi Electric · M80V (BND-2053W000) <=BB
Mitsubishi Electric · M80VW (BND-2054W000) <=BB
Mitsubishi Electric · M800W (BND-2005W000) <=FM
Mitsubishi Electric · M800S (BND-2006W000) <=FM
Mitsubishi Electric · M80 (BND-2007W000) <=FM
Mitsubishi Electric · M80W (BND-2008W000) <=FM
Mitsubishi Electric · E80 (BND-2009W000) <=FM
Mitsubishi Electric · C80 (BND-2036W000) vers:all/*
Mitsubishi Electric · M750VW (BND-1015W002) vers:all/*
Mitsubishi Electric · M730VW (BND-1015W000) vers:all/*
Mitsubishi Electric · M720VW (BND-1015W000) vers:all/*
Mitsubishi Electric · M750VS (BND-1012W002) vers:all/*
Mitsubishi Electric · M730VS (BND-1012W000-**) vers:all/*
Mitsubishi Electric · M720VS (BND-1012W000) vers:all/*
Mitsubishi Electric · M70V (BND-1018W000) vers:all/*
Mitsubishi Electric · E70 (BND-1022W000) vers:all/*
Mitsubishi Electric · NC Trainer2 (BND-1802W000) vers:all/*
Mitsubishi Electric · NC Trainer2 plus (BND-1803W000) vers:all/*

Affected Sectors

Critical Manufacturing

Get alerted to advisories like this

OTWarden monitors CISA, BSI, Siemens, Rockwell and more — and emails you within 2 hours when your vendors are affected.

Start free trial Learn more