Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0921: CWE-250 Execution with Unnecessary Privileges in Mitsubishi Electric Corporation GENESIS64

0
Medium
VulnerabilityCVE-2025-0921cvecve-2025-0921cwe-250
Published: Thu May 15 2025 (05/15/2025, 22:36:37 UTC)
Source: CVE
Vendor/Project: Mitsubishi Electric Corporation
Product: GENESIS64

Description

Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS32 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions, Mitsubishi Electric BizViz all versions, and Mitsubishi Electric Iconics Digital Solutions BizViz all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.

AI-Powered Analysis

AILast updated: 01/09/2026, 10:33:39 UTC

Technical Analysis

CVE-2025-0921 is an execution with unnecessary privileges vulnerability classified under CWE-250, affecting multiple Mitsubishi Electric products including GENESIS64, ICONICS Suite, MC Works64, GENESIS32, and BizViz, across all versions. The vulnerability allows a local authenticated attacker to exploit the way these services handle file write operations by creating symbolic links that redirect write operations to arbitrary files. This symbolic link attack enables the attacker to overwrite or destroy critical files on the system, potentially causing denial-of-service (DoS) conditions if these files are essential for system operation. The attack requires local access and valid authentication but does not require user interaction, making it a privilege escalation and integrity compromise issue. The vulnerability does not directly impact confidentiality or availability but can indirectly cause availability issues through DoS. No known public exploits exist yet, but the vulnerability is significant due to the widespread use of Mitsubishi Electric's industrial automation and visualization software in critical infrastructure and manufacturing environments. The CVSS 3.1 base score is 6.5, reflecting medium severity, with an attack vector of local, low attack complexity, low privileges required, no user interaction, and scope changed due to impact on files outside the original security scope. This vulnerability underscores the risk of improper privilege management and symbolic link handling in industrial control system software.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on Mitsubishi Electric's GENESIS64 and related products, this vulnerability poses a significant risk. Successful exploitation can lead to destruction of critical files, resulting in denial-of-service conditions that disrupt operational technology systems. This disruption can halt production lines, affect energy distribution, or impair building management systems, leading to operational downtime and financial losses. The requirement for local authenticated access limits remote exploitation but insider threats or compromised credentials could be leveraged. The integrity of system files is at risk, which may also affect system reliability and safety. Given the integration of these products in industrial environments, the impact extends beyond IT to operational technology, increasing the potential for physical consequences. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.

Mitigation Recommendations

European organizations should implement strict access controls to limit local user permissions on systems running affected Mitsubishi Electric products, ensuring only trusted administrators have write access. Monitor and audit file system activities for suspicious symbolic link creation or unusual file modifications, particularly in directories used by GENESIS64 and related services. Employ application whitelisting and endpoint protection solutions capable of detecting and blocking symbolic link attacks. Segregate operational technology networks from corporate IT networks to reduce the risk of credential compromise spreading to critical systems. Regularly back up critical configuration and system files to enable recovery in case of file destruction. Coordinate with Mitsubishi Electric for timely patch deployment once available, and apply any recommended configuration changes to reduce unnecessary privileges. Conduct user training to raise awareness about the risks of local credential compromise and insider threats. Finally, implement robust logging and incident response plans tailored to industrial control system environments to quickly detect and respond to exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2025-01-31T01:50:57.976Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebed2

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 1/9/2026, 10:33:39 AM

Last updated: 2/3/2026, 12:24:01 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats