Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES

0
Medium
VulnerabilityCVE-2025-10259cvecve-2025-10259cwe-1284
Published: Thu Nov 06 2025 (11/06/2025, 07:12:24 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC iQ-F Series FX5U-32MT/ES

Description

Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote attacker to disconnect the connection by sending specially crafted TCP packets to cause a denial-of-service (DoS) condition on the products. There is no impact on connections other than the attacked one.

AI-Powered Analysis

AILast updated: 11/20/2025, 08:33:21 UTC

Technical Analysis

CVE-2025-10259 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) found in the TCP communication function of Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES CPU modules. The flaw arises because the device does not properly validate the quantity specified in incoming TCP packets, allowing a remote attacker to craft packets that cause the device to disconnect the targeted TCP connection. This results in a denial-of-service (DoS) condition affecting only the attacked connection, without impacting other active connections or the device's overall operation. The vulnerability can be exploited remotely without requiring any authentication or user interaction, making it accessible to attackers with network access to the device. The CVSS v3.1 base score is 5.3, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and low impact on availability (A:L). No known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of the FX5U-32MT/ES CPU modules in the MELSEC iQ-F Series. The root cause is insufficient input validation in the TCP communication stack, which can be addressed by vendor patches or firmware updates once released.

Potential Impact

For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a risk of targeted denial-of-service attacks on Mitsubishi Electric MELSEC iQ-F Series PLCs. Disruption of TCP connections could lead to temporary loss of communication between control systems and field devices, potentially causing operational delays, production downtime, or safety system interruptions. Although the impact is limited to availability and does not compromise data confidentiality or integrity, even short-term outages in industrial control systems can have significant financial and safety consequences. The vulnerability's ease of exploitation without authentication increases the risk from internal or external threat actors with network access. European organizations with network-exposed PLCs or insufficient network segmentation are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Implement strict network segmentation to isolate MELSEC iQ-F Series PLCs from general IT networks and the internet, limiting exposure to untrusted sources. 2. Configure firewalls and intrusion prevention systems to restrict TCP traffic to only trusted management and control stations, blocking unsolicited or malformed packets. 3. Monitor network traffic for anomalies or repeated connection resets targeting PLC IP addresses, enabling early detection of exploitation attempts. 4. Apply vendor-provided patches or firmware updates promptly once available to address the root cause of the vulnerability. 5. Employ secure communication protocols or VPNs for remote access to PLCs to reduce exposure to crafted TCP packets. 6. Conduct regular security assessments and penetration testing focused on industrial control systems to identify and remediate similar vulnerabilities. 7. Maintain an inventory of all Mitsubishi Electric PLCs deployed and ensure they are included in vulnerability management programs. 8. Train operational technology (OT) personnel on recognizing and responding to network-based DoS attacks targeting control devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2025-09-11T07:30:13.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690c4cee03d96811746c8703

Added to database: 11/6/2025, 7:23:26 AM

Last enriched: 11/20/2025, 8:33:21 AM

Last updated: 12/21/2025, 3:35:09 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats