CVE-2025-11009: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GT Designer3 Version1 (GOT2000)
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using the obtained credentials.
AI Analysis
Technical Summary
CVE-2025-11009 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information. It affects all versions of Mitsubishi Electric Corporation's GT Designer3 Version1 software used for programming and configuring GOT2000 and GOT1000 series human-machine interfaces (HMIs). The vulnerability arises because the software stores sensitive credentials in plaintext within project files. An attacker with local access to these project files, without requiring authentication or user interaction, can extract these plaintext credentials. These credentials can then be used to illegitimately operate or manipulate the GOT series devices, potentially compromising industrial control processes. The attack complexity is high, meaning the attacker needs specific conditions or knowledge to exploit it, and the attack vector is local, requiring physical or network access to the system storing the project files. The vulnerability impacts confidentiality severely but does not affect integrity or availability. No patches or fixes have been published yet, and no known exploits are reported in the wild. This vulnerability highlights a significant security weakness in how sensitive data is stored by industrial automation software, increasing the risk of unauthorized control over critical manufacturing systems.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that rely on Mitsubishi Electric's GT Designer3 software and GOT series HMIs, this vulnerability poses a significant confidentiality risk. Unauthorized access to plaintext credentials could allow attackers to manipulate industrial control systems, potentially leading to operational disruptions or safety incidents. Although the attack requires local access and has high complexity, insider threats or attackers who gain physical or network access to engineering workstations could exploit this vulnerability. The lack of integrity and availability impact limits the scope to unauthorized information disclosure and potential unauthorized control commands. However, given the strategic importance of industrial automation in Europe, exploitation could have cascading effects on production lines and critical services. The absence of patches increases exposure time, necessitating immediate compensating controls.
Mitigation Recommendations
European organizations should implement strict access controls and physical security measures to limit local access to systems storing GT Designer3 project files. Encrypting project files or storing them on encrypted volumes can reduce the risk of credential disclosure. Regular audits and monitoring of access to engineering workstations and project files should be conducted to detect unauthorized access. Network segmentation should isolate engineering and HMI programming environments from broader corporate networks to reduce attack surface. Until official patches are released, consider using virtual desktop infrastructure (VDI) or hardened environments for HMI programming to limit credential exposure. Educate staff about the risks of local credential exposure and enforce strong endpoint security policies. Additionally, organizations should engage with Mitsubishi Electric for updates and apply patches promptly once available.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Czech Republic, Sweden, Spain
CVE-2025-11009: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GT Designer3 Version1 (GOT2000)
Description
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using the obtained credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-11009 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information. It affects all versions of Mitsubishi Electric Corporation's GT Designer3 Version1 software used for programming and configuring GOT2000 and GOT1000 series human-machine interfaces (HMIs). The vulnerability arises because the software stores sensitive credentials in plaintext within project files. An attacker with local access to these project files, without requiring authentication or user interaction, can extract these plaintext credentials. These credentials can then be used to illegitimately operate or manipulate the GOT series devices, potentially compromising industrial control processes. The attack complexity is high, meaning the attacker needs specific conditions or knowledge to exploit it, and the attack vector is local, requiring physical or network access to the system storing the project files. The vulnerability impacts confidentiality severely but does not affect integrity or availability. No patches or fixes have been published yet, and no known exploits are reported in the wild. This vulnerability highlights a significant security weakness in how sensitive data is stored by industrial automation software, increasing the risk of unauthorized control over critical manufacturing systems.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that rely on Mitsubishi Electric's GT Designer3 software and GOT series HMIs, this vulnerability poses a significant confidentiality risk. Unauthorized access to plaintext credentials could allow attackers to manipulate industrial control systems, potentially leading to operational disruptions or safety incidents. Although the attack requires local access and has high complexity, insider threats or attackers who gain physical or network access to engineering workstations could exploit this vulnerability. The lack of integrity and availability impact limits the scope to unauthorized information disclosure and potential unauthorized control commands. However, given the strategic importance of industrial automation in Europe, exploitation could have cascading effects on production lines and critical services. The absence of patches increases exposure time, necessitating immediate compensating controls.
Mitigation Recommendations
European organizations should implement strict access controls and physical security measures to limit local access to systems storing GT Designer3 project files. Encrypting project files or storing them on encrypted volumes can reduce the risk of credential disclosure. Regular audits and monitoring of access to engineering workstations and project files should be conducted to detect unauthorized access. Network segmentation should isolate engineering and HMI programming environments from broader corporate networks to reduce attack surface. Until official patches are released, consider using virtual desktop infrastructure (VDI) or hardened environments for HMI programming to limit credential exposure. Educate staff about the risks of local credential exposure and enforce strong endpoint security policies. Additionally, organizations should engage with Mitsubishi Electric for updates and apply patches promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-09-26T00:33:52.645Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6942060f473cb759e1e34e26
Added to database: 12/17/2025, 1:23:27 AM
Last enriched: 12/24/2025, 4:47:40 AM
Last updated: 2/5/2026, 5:51:33 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0715: CWE-522: Insufficiently Protected Credentials in Moxa UC-1200A Series
HighCVE-2026-0714: CWE-319: Cleartext Transmission of Sensitive Information in Moxa UC-1200A Series
HighCVE-2025-70792: n/a
HighCVE-2025-70791: n/a
HighCVE-2025-69906: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.