PatchSiren cyber security CVE debrief
CVE-2016-8368 Mitsubishielectric CVE debrief
CVE-2016-8368 affects Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, QJ71E71-B5, and QJ71E71-B2, all versions. A remote attacker may connect to the PLC through TCP port 5002 and trigger a denial of service that requires the PLC to be reset to resume operation. NVD maps the issue to CWE-662 and rates it high severity because the attack is network-reachable, requires no privileges or user interaction, and can fully disrupt availability.
- Vendor
- Mitsubishielectric
- Product
- CVE-2016-8368
- CVSS
- HIGH 8.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Industrial control system owners, OT security teams, and operators of MELSEC-Q PLC environments that use QJ71E71-100, QJ71E71-B5, or QJ71E71-B2 Ethernet interface modules, especially where TCP/5002 is reachable from untrusted networks.
Technical summary
The affected Ethernet interface module is connected to a MELSEC-Q PLC and exposes a remotely reachable service on TCP/5002. According to the NVD description, an unrestricted externally accessible lock can be abused by a remote attacker to cause a denial of service, leaving the PLC unavailable until it is reset. NVD assigns CVSS 3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H and CWE-662.
Defensive priority
High for OT and manufacturing environments. The vulnerability is remotely reachable, requires no authentication, and can stop PLC operation until manual recovery, so exposure of TCP/5002 should be treated as a priority risk.
Recommended defensive actions
- Identify whether any MELSEC-Q systems use QJ71E71-100, QJ71E71-B5, or QJ71E71-B2 Ethernet interface modules.
- Restrict or block untrusted access to TCP/5002, especially from enterprise or internet-facing networks.
- Segment PLC networks and limit TCP/5002 access to only explicitly authorized hosts.
- Review the linked US-CERT/ICS advisory and vendor references for mitigation guidance and any available remediation options.
- Verify operational recovery procedures for resetting affected PLCs if a denial of service occurs.
- Use asset and network monitoring to detect unexpected connection attempts to TCP/5002.
Evidence notes
The debrief is based on the supplied NVD record and linked official references. Supporting evidence includes the NVD description stating remote access via TCP/5002 can cause a DoS requiring PLC reset; the NVD CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H; and the CWE-662 weakness mapping. Reference links include SecurityFocus BID 94632 and US-CERT ICSA-16-336-03.
Official resources
-
CVE-2016-8368 CVE record
CVE.org
-
CVE-2016-8368 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Mitigation, Third Party Advisory, US Government Resource
CVE published 2017-02-13; NVD modified 2026-05-13. No KEV entry was supplied for this vulnerability.