ICS Alert (ICS-ALERT-19-225-01)

Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU (Update A)

Click to Tweet.
Click to send to Facebook.
Click to Share.
Click for the STIX file.

Legal Notice

All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.



--------- Begin Update A ---------

CISA is aware of a public report of vulnerabilities with proof-of-concept (PoC) exploit code affecting Mitsubishi Electric Europe B.V. smartRTU (Versions 2.02 and prior) and INEA ME-RTU (Versions 3.0 and prior), remote terminal unit products. According to this report, there are multiple vulnerabilities that could be exploited to gain remote code execution with root privileges. CISA has notified Mitsubishi Electric Europe B.V. of the report and has asked them to confirm the vulnerabilities and identify mitigations. CISA is issuing this alert to provide early notice of the report and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.

--------- End Update A ---------

The report included vulnerability details and PoC exploit code for the following vulnerabilities:

Vulnerability Type Exploitable Remotely Impact
OS command injection Yes Possible remote code execution with admin privileges 
Improper access control Yes Possible remote code execution with admin privileges 
Stored cross-site scripting Yes Possible to run arbitrary code on the client target system
Hard-coded cryptographic keys Yes Possible unauthorized access/disclosure of encrypted data
Hard-coded credentials Yes Possible unauthorized access/execution of admin commands
Plaintext password storage Yes Possible disclosure of usernames and plaintext passwords
Incorrect default permissions No Possible disclosure of usernames and plaintext passwords by a logged in user


Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution with root privileges.Please report any issues affecting control systems in critical infrastructure environments to CISA.

Researcher with the handle Xerubus reported these vulnerabilities to CISA. Researcher followed a 45-day disclosure policy. 

Researcher’s PoC and report have been published at the following link: https://www.mogozobo.com/?p=3593


CISA is currently coordinating with the vendor and security researcher to identify mitigations.
Researcher has recommended the following workaround mitigations until an official fix is available:

  • Ensure devices have appropriate controls to protect the devices from unauthorized network access.
  • Ensure the devices are not exposed or accessible from the Internet.
  • Ensure devices are not exposed or accessible from the corporate or other untrusted networks.
  • Initiate change control and test processes once patches are released by the vendor.  If unable to patch, ensure appropriate controls and logging capability are in place for vulnerable devices.

CISA recommends: 

  • When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Contact Information

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  https://us-cert.cisa.gov/ics 
or incident reporting:  https://us-cert.cisa.gov/report

CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

This product is provided subject to this Notification and this Privacy & Use policy.

Please share your thoughts.

We recently updated our anonymous product survey; we'd welcome your feedback.