Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10089: CWE-427 Uncontrolled Search Path Element in Mitsubishi Electric Corporation MILCO.S Setting Application

0
High
VulnerabilityCVE-2025-10089cvecve-2025-10089cwe-427
Published: Tue Nov 18 2025 (11/18/2025, 07:39:05 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MILCO.S Setting Application

Description

Uncontrolled Search Path Element Vulnerability in Setting and Operation Application for Lighting Control System MILCO.S Setting Application all versions, MILCO.S Setting Application (IR) all versions, MILCO.S Easy Setting Application (IR) all versions, and MILCO.S Easy Switch Application (IR) all versions allows a local attacker to execute malicious code by having installer to load a malicious DLL. However, if the signer name "Mitsubishi Electric Lighting" appears on the "Digital Signatures" tab of the properties for "MILCO.S Lighting Control.exe", the application is a fixed one. This vulnerability only affects when the installer is run, not after installation. If a user downloads directly from Mitsubishi Electric website and installs the affected product, there is no risk of malicious code being introduced.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:37:00 UTC

Technical Analysis

CVE-2025-10089 is an Uncontrolled Search Path Element vulnerability (CWE-427) affecting all versions of Mitsubishi Electric Corporation's MILCO.S Setting Application and its variants, including MILCO.S Setting Application (IR), MILCO.S Easy Setting Application (IR), and MILCO.S Easy Switch Application (IR). The vulnerability allows a local attacker to execute arbitrary code by exploiting the way the installer loads DLLs during the installation process. Specifically, the installer does not securely specify the DLL search path, allowing an attacker to place a malicious DLL in a location that the installer searches before the legitimate DLL, resulting in the malicious code being loaded and executed with the installer's privileges. This flaw only manifests during installation and does not affect the application once installed. The vulnerability is mitigated if the installer executable is digitally signed by "Mitsubishi Electric Lighting," as verified via the Digital Signatures tab on the executable's properties. Users who download the installer directly from Mitsubishi Electric's official website are not at risk of malicious code injection, as the official installer is signed and trusted. The CVSS v3.1 base score is 7.7 (High), reflecting local attack vector (AV:L), high attack complexity (AC:H), no privileges required (PR:N), required user interaction (UI:R), scope change (S:C), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild. The vulnerability underscores the importance of secure DLL loading practices and verifying digital signatures to prevent code execution attacks during software installation.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily during the installation phase of the MILCO.S Setting Application and its variants. Successful exploitation can lead to arbitrary code execution with the privileges of the installer process, potentially allowing attackers to install persistent malware, escalate privileges, or disrupt lighting control systems. Given that lighting control systems may be integrated into critical infrastructure, manufacturing facilities, commercial buildings, and smart building environments, compromise could lead to operational disruptions, safety hazards, and data breaches. The requirement for local access and user interaction limits remote exploitation but increases risk from insider threats or social engineering attacks targeting installation personnel. The high impact on confidentiality, integrity, and availability means that attackers could manipulate system behavior, steal sensitive configuration data, or cause denial of service. European organizations relying on Mitsubishi Electric's lighting control solutions should be aware of this risk, especially in sectors where lighting systems are part of broader industrial control or building management systems.

Mitigation Recommendations

1. Verify the digital signature of the installer executable before running it; ensure the signer name is "Mitsubishi Electric Lighting" to confirm authenticity and that the vulnerability is patched. 2. Obtain installers only from the official Mitsubishi Electric website or trusted sources to avoid tampered installers. 3. Restrict installation privileges to trusted IT or facilities personnel to reduce the risk of malicious DLL placement by unauthorized users. 4. Implement application whitelisting and endpoint protection solutions that monitor and block unauthorized DLLs from loading during installation processes. 5. Educate staff responsible for installation about the risks of running unsigned or unverified installers and the importance of verifying digital signatures. 6. Consider performing installations in isolated or controlled environments to limit the impact of potential exploitation. 7. Monitor system logs and file system changes during installation for signs of suspicious activity. 8. Engage with Mitsubishi Electric for updates or patches that explicitly address this vulnerability and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2025-09-08T03:49:40.948Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c2e7635a0ab0a5625e9bb

Added to database: 11/18/2025, 8:29:42 AM

Last enriched: 12/2/2025, 2:37:00 PM

Last updated: 1/7/2026, 5:24:59 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats