CVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote attacker to disconnect the connection by sending specially crafted TCP packets to cause a denial-of-service (DoS) condition on the products. There is no impact on connections other than the attacked one.
AI Analysis
Technical Summary
CVE-2025-10259 identifies a vulnerability in the TCP communication function of Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES programmable logic controllers (PLCs). The root cause is improper validation of the specified quantity in input data, classified under CWE-1284. This flaw allows a remote attacker to craft and send malicious TCP packets that exploit this validation weakness, resulting in the disconnection of the targeted TCP connection. The consequence is a denial-of-service (DoS) condition affecting only the attacked connection, without broader system compromise or impact on other concurrent connections. The vulnerability requires no privileges or user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, no user interaction, and impact limited to availability. No patches or exploits are currently known, but the vulnerability affects all versions of the FX5U-32MT/ES CPU modules. Given the critical role of these PLCs in industrial automation, exploitation could disrupt manufacturing processes or critical infrastructure operations relying on these devices. The vulnerability highlights the importance of robust input validation in industrial communication protocols to prevent service interruptions.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that deploy Mitsubishi MELSEC iQ-F Series PLCs, this vulnerability poses a risk of operational disruption through targeted denial-of-service attacks. While it does not compromise data confidentiality or integrity, the ability to disconnect TCP connections remotely can interrupt control commands or monitoring data flows, potentially halting automated processes or causing safety system delays. This could lead to production downtime, financial losses, and safety hazards in industrial environments. The limited scope to the attacked connection reduces the risk of widespread system failure but does not eliminate the impact on critical operations. Organizations with remote or exposed network access to these PLCs are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the medium severity score indicates a need for timely attention to prevent exploitation as threat actors develop attack tools.
Mitigation Recommendations
1. Implement strict network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. 2. Deploy firewall rules to limit TCP traffic to and from the PLCs, allowing only necessary communication ports and known IP addresses. 3. Monitor network traffic for anomalous or malformed TCP packets targeting the PLCs, using intrusion detection/prevention systems with signatures or heuristics for unusual input patterns. 4. Restrict remote access to the PLCs via VPNs or secure jump hosts with multi-factor authentication to reduce exposure. 5. Regularly audit and update network device configurations to minimize attack surface. 6. Engage with Mitsubishi Electric for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Develop incident response plans specific to industrial control system disruptions to minimize downtime if an attack occurs. 8. Train operational technology (OT) personnel to recognize signs of network-based DoS attacks and respond accordingly.
Affected Countries
Germany, Italy, France, United Kingdom, Spain, Poland, Netherlands, Belgium, Czech Republic, Sweden
CVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Description
Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote attacker to disconnect the connection by sending specially crafted TCP packets to cause a denial-of-service (DoS) condition on the products. There is no impact on connections other than the attacked one.
AI-Powered Analysis
Technical Analysis
CVE-2025-10259 identifies a vulnerability in the TCP communication function of Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES programmable logic controllers (PLCs). The root cause is improper validation of the specified quantity in input data, classified under CWE-1284. This flaw allows a remote attacker to craft and send malicious TCP packets that exploit this validation weakness, resulting in the disconnection of the targeted TCP connection. The consequence is a denial-of-service (DoS) condition affecting only the attacked connection, without broader system compromise or impact on other concurrent connections. The vulnerability requires no privileges or user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges required, no user interaction, and impact limited to availability. No patches or exploits are currently known, but the vulnerability affects all versions of the FX5U-32MT/ES CPU modules. Given the critical role of these PLCs in industrial automation, exploitation could disrupt manufacturing processes or critical infrastructure operations relying on these devices. The vulnerability highlights the importance of robust input validation in industrial communication protocols to prevent service interruptions.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that deploy Mitsubishi MELSEC iQ-F Series PLCs, this vulnerability poses a risk of operational disruption through targeted denial-of-service attacks. While it does not compromise data confidentiality or integrity, the ability to disconnect TCP connections remotely can interrupt control commands or monitoring data flows, potentially halting automated processes or causing safety system delays. This could lead to production downtime, financial losses, and safety hazards in industrial environments. The limited scope to the attacked connection reduces the risk of widespread system failure but does not eliminate the impact on critical operations. Organizations with remote or exposed network access to these PLCs are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the medium severity score indicates a need for timely attention to prevent exploitation as threat actors develop attack tools.
Mitigation Recommendations
1. Implement strict network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. 2. Deploy firewall rules to limit TCP traffic to and from the PLCs, allowing only necessary communication ports and known IP addresses. 3. Monitor network traffic for anomalous or malformed TCP packets targeting the PLCs, using intrusion detection/prevention systems with signatures or heuristics for unusual input patterns. 4. Restrict remote access to the PLCs via VPNs or secure jump hosts with multi-factor authentication to reduce exposure. 5. Regularly audit and update network device configurations to minimize attack surface. 6. Engage with Mitsubishi Electric for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Develop incident response plans specific to industrial control system disruptions to minimize downtime if an attack occurs. 8. Train operational technology (OT) personnel to recognize signs of network-based DoS attacks and respond accordingly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-09-11T07:30:13.929Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690c4cee03d96811746c8703
Added to database: 11/6/2025, 7:23:26 AM
Last enriched: 11/6/2025, 7:38:33 AM
Last updated: 11/6/2025, 9:16:08 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighCVE-2025-12560: CWE-918 Server-Side Request Forgery (SSRF) in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.