Known vulnerabilities in Mitsubishi Electric MELSEC iQ-F FX5UC-32MT/DS-TS

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Mitsubishi Electric › MELSEC iQ-F FX5UC-32MT/DS-TS

Known vulnerabilities in Mitsubishi Electric MELSEC iQ-F FX5UC-32MT/DS-TS

Vendor: Mitsubishi Electric
Website: https://www.mitsubishielectric.com/
Total Security Bulletins: 8
1.290 1.220 1.281 1.280 1.270

Security bulletins (8)

Secuity bulletin Severity Status Published
SB2025070415: Overly restrictive account lockout mechanism in Mitsubishi Electric MELSEC iQ-F Series Medium
Not patched
04.07.2025
SB2025060417: Improper Validation of Specified Index, Position, or Offset in Input in Mitsubishi Electric MELSEC iQ-F Series High
Not patched
04.06.2025
SB2024022804: Denial of service in Mitsubishi Electric Factory Automation Products Medium
Not patched
28.02.2024
SB2023110330: Insufficient verification of data authenticity in Mitsubishi Electric MELSEC Series High
Not patched
03.11.2023
SB2023110329: Improper Restriction of Excessive Authentication Attempts in Mitsubishi Electric MELSEC iQ-F Series CPU Module Medium
Not patched
03.11.2023
SB2023052433: Remote code execution in Mitsubishi Electric MELSEC iQ-F Series High
Patched
24.05.2023
SB2023011819: Predictable Seed in Pseudo-Random Number Generator in Mitsubishi Electric MELSEC iQ-F, iQ-R Series Medium
Patched Public exploit
18.01.2023
SB2022052005: Multiple vulnerabilities in Mitsubishi Electric MELSEC iQ-F Series High
Patched
20.05.2022


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or