Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows

0
High
VulnerabilityCVE-2025-10314cvecve-2025-10314cwe-276
Published: Thu Feb 05 2026 (02/05/2026, 03:07:55 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: FREQSHIP-mini for Windows

Description

CVE-2025-10314 is a high-severity vulnerability in Mitsubishi Electric Corporation's FREQSHIP-mini for Windows versions 8. 0. 0 to 8. 0. 2. It arises from incorrect default permissions that allow a local attacker with limited privileges to replace service executable files or DLLs in the installation directory with malicious versions. Exploiting this flaw enables arbitrary code execution with system-level privileges, potentially leading to full system compromise, data disclosure, tampering, deletion, or denial of service. No user interaction is required, but local access with low privileges is necessary. The vulnerability affects confidentiality, integrity, and availability of affected systems. Although no known exploits are currently reported in the wild, the high CVSS score (8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:38:22 UTC

Technical Analysis

CVE-2025-10314 is a vulnerability categorized under CWE-276 (Incorrect Default Permissions) found in Mitsubishi Electric Corporation's FREQSHIP-mini for Windows versions 8.0.0 through 8.0.2. The root cause is improper permission settings on the installation directory and its service executable files (EXE) and dynamic link libraries (DLLs). These permissions allow a local attacker with limited privileges (low-level user) to replace or overwrite these critical files with specially crafted malicious files. Because the service runs with system-level privileges, the attacker’s malicious code executes with full system rights, enabling complete control over the affected machine. This can lead to unauthorized disclosure of sensitive information, modification or destruction of data, and denial of service conditions. The vulnerability does not require user interaction but does require local access with some privileges. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and limited privileges required. Currently, no public exploits or patches are available, increasing the urgency for organizations to implement compensating controls. The vulnerability is particularly critical for environments where FREQSHIP-mini is used for industrial control or manufacturing processes, as compromise could disrupt operations or lead to safety risks.

Potential Impact

For European organizations, the impact of CVE-2025-10314 can be significant, especially in sectors relying on Mitsubishi Electric's FREQSHIP-mini software for industrial automation, manufacturing, or process control. Successful exploitation allows attackers to gain system-level control, potentially leading to theft or manipulation of sensitive operational data, disruption of manufacturing processes, or complete system outages. This can result in financial losses, regulatory non-compliance, and damage to reputation. Given the critical nature of industrial control systems in Europe’s manufacturing hubs (e.g., Germany, Italy), a compromise could also have cascading effects on supply chains. Additionally, the ability to cause denial of service or data destruction raises concerns about operational continuity and safety. The vulnerability’s requirement for local access limits remote exploitation but insider threats or attackers gaining initial footholds through other means could leverage this flaw to escalate privileges and cause severe damage.

Mitigation Recommendations

1. Immediately audit and restrict permissions on the FREQSHIP-mini installation directory and its executable and DLL files to ensure only trusted system accounts have write access. 2. Implement application whitelisting to prevent unauthorized executables or DLLs from running. 3. Employ endpoint detection and response (EDR) solutions to monitor for suspicious file modifications or service restarts. 4. Limit local user privileges strictly, avoiding unnecessary administrative rights for users who do not require them. 5. Use network segmentation to isolate systems running FREQSHIP-mini from less trusted networks or user groups. 6. Monitor logs for unusual activity related to service files or privilege escalations. 7. Engage with Mitsubishi Electric for official patches or updates and apply them promptly once available. 8. Consider deploying host-based intrusion prevention systems (HIPS) to block unauthorized file replacements. 9. Educate staff about the risks of local privilege escalation and enforce strong endpoint security policies. 10. If patching is delayed, consider temporary mitigations such as removing or disabling the vulnerable service where feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2025-09-12T00:24:58.194Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69840b3cf9fa50a62fd8cac3

Added to database: 2/5/2026, 3:15:08 AM

Last enriched: 2/12/2026, 7:38:22 AM

Last updated: 3/22/2026, 8:26:38 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses