Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Iconics Mitsubishi Products Vulnerabilities

July 2, 2024
Reading Time: 2 mins read
in Alerts
Iconics Mitsubishi Products Vulnerabilities

The advisory highlights multiple vulnerabilities in ICONICS and Mitsubishi Electric products, including GENESIS64, Hyper Historian, AnalytiX, and MobileHMI. These vulnerabilities, if exploited, can result in denial of service, improper privilege management, or even remote code execution. Affected versions include ICONICS Suite Version 10.97.2 and below, as well as AlarmWorX64 MMX and MobileHMI versions prior to 10.97.3.

The vulnerabilities identified include the allocation of resources without limits, improper neutralization of code, uncontrolled search path elements, improper authentication, and unsafe reflection. These flaws are particularly risky as they can allow denial of service or unauthorized privilege escalation in the affected systems. Exploiting them remotely is possible, but it requires a high level of complexity.

ICONICS recommends users update to Version 10.97.3 to address these vulnerabilities. Mitigations such as following security guidelines from the ICONICS Whitepaper and applying the latest security patches are advised. Both ICONICS and Mitsubishi Electric are rolling out critical updates and security patches to fix these issues.

CISA advises further defensive measures, such as minimizing network exposure, using firewalls, and adopting secure remote access methods like VPNs. They also recommend following best cybersecurity practices to protect against potential exploitation. At this time, no public reports of exploitation for these vulnerabilities have been made.

Reference:
  • ICONICS Mitsubishi Electric Products Exploit Risks Escalate Globally
Tags: AnalytiXCyber AlertsCyber Alerts 2024Cyber threatsGENESIS64Hyper HistorianICONICSJuly 2024Mitsubishi Electric productsMobileHMIVulnerabilities
ADVERTISEMENT

Related Posts

Chrome Addon Injects Hidden Solana Fees

JackFix Spreads Stealers Via Fake Updates

November 26, 2025
Chrome Addon Injects Hidden Solana Fees

RomCom Uses Fake Updates To Spread Malware

November 26, 2025
Chrome Addon Injects Hidden Solana Fees

Chrome Addon Injects Hidden Solana Fees

November 26, 2025
CISA Highlights Ongoing Spyware Campaign

Formatters Leak Thousands Of Secrets

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

Second Wave Hits Thousands Of Repos

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

CISA Highlights Ongoing Spyware Campaign

November 25, 2025

Latest Alerts

JackFix Spreads Stealers Via Fake Updates

RomCom Uses Fake Updates To Spread Malware

Chrome Addon Injects Hidden Solana Fees

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Subscribe to our newsletter

    Latest Incidents

    Exchange Online Outage Blocks Mail

    CodeRED Cyberattack Disrupts Alerts

    Hacker Takes Over Houston Radio Airwaves

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial