CVE-2025-0921: CWE-250 Execution with Unnecessary Privileges in Mitsubishi Electric Corporation GENESIS64
Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS32 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions, Mitsubishi Electric BizViz all versions, and Mitsubishi Electric Iconics Digital Solutions BizViz all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.
AI Analysis
Technical Summary
CVE-2025-0921 is an execution with unnecessary privileges vulnerability classified under CWE-250, affecting multiple Mitsubishi Electric products including GENESIS64, ICONICS Suite, MC Works64, GENESIS32, and BizViz, across all versions. The vulnerability allows a local authenticated attacker to exploit the way these services handle file write operations by creating symbolic links that redirect write operations to arbitrary files. This symbolic link attack enables the attacker to overwrite or destroy critical files on the system, potentially causing denial-of-service (DoS) conditions if these files are essential for system operation. The attack requires local access and valid authentication but does not require user interaction, making it a privilege escalation and integrity compromise issue. The vulnerability does not directly impact confidentiality or availability but can indirectly cause availability issues through DoS. No known public exploits exist yet, but the vulnerability is significant due to the widespread use of Mitsubishi Electric's industrial automation and visualization software in critical infrastructure and manufacturing environments. The CVSS 3.1 base score is 6.5, reflecting medium severity, with an attack vector of local, low attack complexity, low privileges required, no user interaction, and scope changed due to impact on files outside the original security scope. This vulnerability underscores the risk of improper privilege management and symbolic link handling in industrial control system software.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on Mitsubishi Electric's GENESIS64 and related products, this vulnerability poses a significant risk. Successful exploitation can lead to destruction of critical files, resulting in denial-of-service conditions that disrupt operational technology systems. This disruption can halt production lines, affect energy distribution, or impair building management systems, leading to operational downtime and financial losses. The requirement for local authenticated access limits remote exploitation but insider threats or compromised credentials could be leveraged. The integrity of system files is at risk, which may also affect system reliability and safety. Given the integration of these products in industrial environments, the impact extends beyond IT to operational technology, increasing the potential for physical consequences. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.
Mitigation Recommendations
European organizations should implement strict access controls to limit local user permissions on systems running affected Mitsubishi Electric products, ensuring only trusted administrators have write access. Monitor and audit file system activities for suspicious symbolic link creation or unusual file modifications, particularly in directories used by GENESIS64 and related services. Employ application whitelisting and endpoint protection solutions capable of detecting and blocking symbolic link attacks. Segregate operational technology networks from corporate IT networks to reduce the risk of credential compromise spreading to critical systems. Regularly back up critical configuration and system files to enable recovery in case of file destruction. Coordinate with Mitsubishi Electric for timely patch deployment once available, and apply any recommended configuration changes to reduce unnecessary privileges. Conduct user training to raise awareness about the risks of local credential compromise and insider threats. Finally, implement robust logging and incident response plans tailored to industrial control system environments to quickly detect and respond to exploitation attempts.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-0921: CWE-250 Execution with Unnecessary Privileges in Mitsubishi Electric Corporation GENESIS64
Description
Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS32 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions, Mitsubishi Electric BizViz all versions, and Mitsubishi Electric Iconics Digital Solutions BizViz all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.
AI-Powered Analysis
Technical Analysis
CVE-2025-0921 is an execution with unnecessary privileges vulnerability classified under CWE-250, affecting multiple Mitsubishi Electric products including GENESIS64, ICONICS Suite, MC Works64, GENESIS32, and BizViz, across all versions. The vulnerability allows a local authenticated attacker to exploit the way these services handle file write operations by creating symbolic links that redirect write operations to arbitrary files. This symbolic link attack enables the attacker to overwrite or destroy critical files on the system, potentially causing denial-of-service (DoS) conditions if these files are essential for system operation. The attack requires local access and valid authentication but does not require user interaction, making it a privilege escalation and integrity compromise issue. The vulnerability does not directly impact confidentiality or availability but can indirectly cause availability issues through DoS. No known public exploits exist yet, but the vulnerability is significant due to the widespread use of Mitsubishi Electric's industrial automation and visualization software in critical infrastructure and manufacturing environments. The CVSS 3.1 base score is 6.5, reflecting medium severity, with an attack vector of local, low attack complexity, low privileges required, no user interaction, and scope changed due to impact on files outside the original security scope. This vulnerability underscores the risk of improper privilege management and symbolic link handling in industrial control system software.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on Mitsubishi Electric's GENESIS64 and related products, this vulnerability poses a significant risk. Successful exploitation can lead to destruction of critical files, resulting in denial-of-service conditions that disrupt operational technology systems. This disruption can halt production lines, affect energy distribution, or impair building management systems, leading to operational downtime and financial losses. The requirement for local authenticated access limits remote exploitation but insider threats or compromised credentials could be leveraged. The integrity of system files is at risk, which may also affect system reliability and safety. Given the integration of these products in industrial environments, the impact extends beyond IT to operational technology, increasing the potential for physical consequences. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.
Mitigation Recommendations
European organizations should implement strict access controls to limit local user permissions on systems running affected Mitsubishi Electric products, ensuring only trusted administrators have write access. Monitor and audit file system activities for suspicious symbolic link creation or unusual file modifications, particularly in directories used by GENESIS64 and related services. Employ application whitelisting and endpoint protection solutions capable of detecting and blocking symbolic link attacks. Segregate operational technology networks from corporate IT networks to reduce the risk of credential compromise spreading to critical systems. Regularly back up critical configuration and system files to enable recovery in case of file destruction. Coordinate with Mitsubishi Electric for timely patch deployment once available, and apply any recommended configuration changes to reduce unnecessary privileges. Conduct user training to raise awareness about the risks of local credential compromise and insider threats. Finally, implement robust logging and incident response plans tailored to industrial control system environments to quickly detect and respond to exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-01-31T01:50:57.976Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebed2
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 1/9/2026, 10:33:39 AM
Last updated: 2/3/2026, 12:24:01 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1664: CWE-639 Authorization Bypass Through User-Controlled Key
MediumCVE-2025-11598: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Centralny Ośrodek Informatyki mObywatel
LowCVE-2026-1432: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in T-Systems Buroweb
CriticalRussia’s APT28 Rapidly Weaponizes Newly Patched Office Vulnerability
MediumCVE-2025-8461: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Seres Software syWEB
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.