Impact
An always‑incorrect control flow implementation (CWE‑670) in Mitsubishi Electric’s MELSEC iQ‑F Series FX5‑ENET/IP Ethernet Module FX5‑ENET/IP versions 1.106 and prior, and the FX5‑EIP EtherNet/IP Module FX5‑EIP versions 1.000 and prior, permits a remote attacker to trigger a denial‑of‑service condition by repeatedly sending UDP packets to the device. The continuous flood causes internal state corruption and results in a persistent DoS that can only be recovered through a system reset.
Affected Systems
The vulnerability affects Mitsubishi Electric’s MELSEC iQ‑F Series FX5‑EIP EtherNet/IP Module FX5‑EIP (all released versions) and the FX5‑ENET/IP Ethernet Module FX5‑ENET/IP versions up to and including 1.106. Network engineers must verify that any deployed devices of these models are within this version range.
Risk and Exploitability
The CVSS score of 8.7 indicates a high impact on availability, while the EPSS value of less than 1% suggests a low likelihood of exploitation. The flaw is not listed in CISA’s KEV catalog, and no authentication is required, meaning any unauthenticated actor can trigger the DoS by sending crafted UDP packets over the network.
OpenCVE Enrichment