Software Vulnerabilities Affecting Mitsubishi Electric SCADA Component

Photograph of Mitsubishi Electric Robot

Software vulnerabilities can afflict a wide gamut of software products, ranging from mainstream home user products to industry-grade software designed for heavy industrial and manufacturing applications. As cyberthreats transcend into the cyber-physical paradigm this year, vulnerabilities affecting the industry become potentially catastrophic. The consensus in the IT and defense sectors is that notable upticks in threat group activity and ransomware attacks are more pronounced in 2021. This confirms the concerns of the cybersecurity industry as well, and as such vulnerabilities in industrial components are particularly concerning at a time when the largest tech corporations are at risk, even still as the cybersecurity industry risks crippling attacks.

To that end, an industrial software vulnerability report has been published on October 21st, 2021 revealing vulnerabilities within an important industrial oversight and supervision component known as SCADA or Supervisory Control And Data Acquisition. The product in question belongs to Mitsubishi Electric, specifically their MC Works64 software component. Information about the vulnerability has also been mirrored on CISA‘s portal (Cybersecurity & Infrastructure Agency).

About MC Works64

MC Works64 is an industrial monitoring and control system (SCADA) relating to production processes, operations, and manufacturing that provides real-time visualization, analytics, connectivity, and more for “manufacturing, industrial automation, and smart buildings customers”. SCADA systems exist to solve manufacturing issues and boost the efficiency of industrial plant machines and robotics. According to Allied Market Research, the SCADA global market is led by companies such as IBM Corp, Rockwell Automation, Hitachi LTD, Mitsubishi Electric and a few more key players.

The MC Works64 Vulnerability

Details from the reports reveal the software vulnerability affecting the Mistubishi Electric MC Works64 component is classified as high risk and can lead to complete compromise of a system that has not been patched to the latest secure version.

In-Depth Details

The vulnerability report details two types of security flaws in the software code; a Buffer overflow type software vulnerability (CVE-2021-27041) and an Out-of-bounds-read type software vulnerability. Both afflict unpatched versions of MC Works64. The flaws allow a remote attacker to execute arbitrary code on the target system. The instances exist due to a boundary error when processing DWG files, thus a remote attacker can as a result create a specially crafted DWG file, trick the victim into opening it, trigger memory corruption, and an out-of-bounds-read. Finally, the scenario allows a remote attacker to execute malicious arbitrary code on the target system. 

Vulnerable Software Versions

The following version of MC Works64 are vulnerable;

MC Works64: 4.04E and earlier.

Important User Information

A patch has been released that fixes the high-risk software vulnerability affecting MC Works64. To apply the patch, Mitsubishi Electric shows the following steps (note: for more information about steps and mitigations please refer to this page);

Download the security patch from “MC Works64 AND MC Works 32 SECURITY UPDATES” ( on ICONICS Web site.

1) For Users using MC Works64 Version 4.04E
“MC Works64 Version 4.04E (Version Security Patches“

2) For Users using MC Works64 Edge-computing Edition Version 4.04E

“MC Works64 Version 4.04E (Version Security Patches“

3)  For Users using MC Works64 Version 4.00A to 4.03D
Please get the MC Works64 Version 4.04E installer from your local Mitsubishi Electric representative, install it, and then apply the security patch described in 2. 1).

4)  For Users using MC Works64 Version 3.04E
“MC Works64 Version 3.04E (Version Security Patches“

5)  For Users using MC Works64 Version 3.00A – 3.03D
Please get the MC Works64 Version 3.04E installer from your local Mitsubishi Electric representative, install it, and then apply the security patch described in 2. 4).

6)  For Users using MC Works64 Version 2.02C or earlier* Please contact your local Mitsubishi Electric representative.

* This applies if the version number is “” or earlier in the version of “MELSOFT MC Works64”, which you can confirm in “How to check the version” of “Affected products”.

Tech researcher & communications specialist
Mirza has an education background in Global Communications, has worked in advertising, marketing, journalism and television over the years while living in several different countries. He is now working to consolidate news and outreach at, while in his free time he likes to work on documentary projects, read about sociology and write about world events.