Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11009: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GT Designer3 Version1 (GOT2000)

0
Medium
VulnerabilityCVE-2025-11009cvecve-2025-11009cwe-312
Published: Wed Dec 17 2025 (12/17/2025, 00:55:58 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: GT Designer3 Version1 (GOT2000)

Description

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using the obtained credentials.

AI-Powered Analysis

AILast updated: 12/17/2025, 01:38:15 UTC

Technical Analysis

CVE-2025-11009 is a vulnerability classified under CWE-312 (Cleartext Storage of Sensitive Information) found in Mitsubishi Electric Corporation's GT Designer3 Version1 software, which is used to program and configure Human Machine Interfaces (HMIs) in the GOT2000 and GOT1000 series. The vulnerability affects all versions of the software and involves the insecure storage of sensitive credentials in plaintext within project files. These project files, which are used to configure HMI devices, contain authentication credentials that are not encrypted or otherwise protected. A local attacker without authentication privileges can access these project files and extract the plaintext credentials. With these credentials, the attacker can illegitimately operate or manipulate the GOT2000 or GOT1000 series devices, potentially impacting industrial control processes. The vulnerability has a CVSS 3.1 base score of 5.1, indicating medium severity. The attack vector is local (AV:L), meaning physical or logical local access is required. The attack complexity is high (AC:H), suggesting that exploitation requires specific conditions or knowledge. No privileges are required (PR:N), and no user interaction is needed (UI:N). The impact is high on confidentiality (C:H) but does not affect integrity or availability. There are no patches currently available, and no known exploits have been reported in the wild. This vulnerability highlights a significant security weakness in how sensitive information is stored within industrial automation software, posing risks of unauthorized device control if local access is obtained.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that rely on Mitsubishi Electric's GOT2000 and GOT1000 HMI devices, this vulnerability poses a risk of unauthorized access and control over industrial processes. The cleartext storage of credentials means that any insider threat or attacker who gains local access to engineering workstations or project files can extract sensitive authentication data. This could lead to unauthorized manipulation of industrial equipment, potentially causing operational disruptions, safety hazards, or production downtime. The confidentiality breach could also facilitate further lateral movement within industrial networks. Given the high attack complexity and local access requirement, remote exploitation is unlikely without prior network or physical compromise. However, the lack of encryption for credentials represents a fundamental security flaw that undermines trust in the affected software. European organizations with stringent regulatory requirements for industrial cybersecurity (e.g., NIS Directive compliance) may face compliance risks if this vulnerability is not addressed promptly.

Mitigation Recommendations

1. Restrict local access to engineering workstations and project files to authorized personnel only, implementing strict physical and logical access controls. 2. Implement full disk encryption and secure storage solutions for project files to prevent unauthorized reading of sensitive data. 3. Regularly audit and monitor access logs on systems running GT Designer3 to detect any unauthorized file access or copying. 4. Use network segmentation to isolate engineering workstations from general IT and operational networks, limiting lateral movement opportunities. 5. Where possible, apply application whitelisting and endpoint protection to prevent unauthorized tools from accessing or extracting project files. 6. Engage with Mitsubishi Electric for updates or patches addressing this vulnerability and plan for timely deployment once available. 7. Educate staff on the risks of storing sensitive credentials in plaintext and promote best practices for credential management. 8. Consider implementing multi-factor authentication on devices and systems that support it to reduce the impact of credential compromise. 9. Backup project files securely and maintain version control to detect unauthorized modifications. 10. Conduct regular security assessments and penetration tests focusing on industrial control system environments to identify and remediate similar weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2025-09-26T00:33:52.645Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942060f473cb759e1e34e26

Added to database: 12/17/2025, 1:23:27 AM

Last enriched: 12/17/2025, 1:38:15 AM

Last updated: 12/17/2025, 4:03:39 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats