Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Iconics Mitsubishi Products Vulnerabilities

July 2, 2024
Reading Time: 2 mins read
in Alerts
Iconics Mitsubishi Products Vulnerabilities

The advisory highlights multiple vulnerabilities in ICONICS and Mitsubishi Electric products, including GENESIS64, Hyper Historian, AnalytiX, and MobileHMI. These vulnerabilities, if exploited, can result in denial of service, improper privilege management, or even remote code execution. Affected versions include ICONICS Suite Version 10.97.2 and below, as well as AlarmWorX64 MMX and MobileHMI versions prior to 10.97.3.

The vulnerabilities identified include the allocation of resources without limits, improper neutralization of code, uncontrolled search path elements, improper authentication, and unsafe reflection. These flaws are particularly risky as they can allow denial of service or unauthorized privilege escalation in the affected systems. Exploiting them remotely is possible, but it requires a high level of complexity.

ICONICS recommends users update to Version 10.97.3 to address these vulnerabilities. Mitigations such as following security guidelines from the ICONICS Whitepaper and applying the latest security patches are advised. Both ICONICS and Mitsubishi Electric are rolling out critical updates and security patches to fix these issues.

CISA advises further defensive measures, such as minimizing network exposure, using firewalls, and adopting secure remote access methods like VPNs. They also recommend following best cybersecurity practices to protect against potential exploitation. At this time, no public reports of exploitation for these vulnerabilities have been made.

Reference:
  • ICONICS Mitsubishi Electric Products Exploit Risks Escalate Globally
Tags: AnalytiXCyber AlertsCyber Alerts 2024Cyber threatsGENESIS64Hyper HistorianICONICSJuly 2024Mitsubishi Electric productsMobileHMIVulnerabilities
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial