Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11009: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GT Designer3 Version1 (GOT2000)

0
Medium
VulnerabilityCVE-2025-11009cvecve-2025-11009cwe-312
Published: Wed Dec 17 2025 (12/17/2025, 00:55:58 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: GT Designer3 Version1 (GOT2000)

Description

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using the obtained credentials.

AI-Powered Analysis

AILast updated: 12/24/2025, 04:47:40 UTC

Technical Analysis

CVE-2025-11009 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information. It affects all versions of Mitsubishi Electric Corporation's GT Designer3 Version1 software used for programming and configuring GOT2000 and GOT1000 series human-machine interfaces (HMIs). The vulnerability arises because the software stores sensitive credentials in plaintext within project files. An attacker with local access to these project files, without requiring authentication or user interaction, can extract these plaintext credentials. These credentials can then be used to illegitimately operate or manipulate the GOT series devices, potentially compromising industrial control processes. The attack complexity is high, meaning the attacker needs specific conditions or knowledge to exploit it, and the attack vector is local, requiring physical or network access to the system storing the project files. The vulnerability impacts confidentiality severely but does not affect integrity or availability. No patches or fixes have been published yet, and no known exploits are reported in the wild. This vulnerability highlights a significant security weakness in how sensitive data is stored by industrial automation software, increasing the risk of unauthorized control over critical manufacturing systems.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that rely on Mitsubishi Electric's GT Designer3 software and GOT series HMIs, this vulnerability poses a significant confidentiality risk. Unauthorized access to plaintext credentials could allow attackers to manipulate industrial control systems, potentially leading to operational disruptions or safety incidents. Although the attack requires local access and has high complexity, insider threats or attackers who gain physical or network access to engineering workstations could exploit this vulnerability. The lack of integrity and availability impact limits the scope to unauthorized information disclosure and potential unauthorized control commands. However, given the strategic importance of industrial automation in Europe, exploitation could have cascading effects on production lines and critical services. The absence of patches increases exposure time, necessitating immediate compensating controls.

Mitigation Recommendations

European organizations should implement strict access controls and physical security measures to limit local access to systems storing GT Designer3 project files. Encrypting project files or storing them on encrypted volumes can reduce the risk of credential disclosure. Regular audits and monitoring of access to engineering workstations and project files should be conducted to detect unauthorized access. Network segmentation should isolate engineering and HMI programming environments from broader corporate networks to reduce attack surface. Until official patches are released, consider using virtual desktop infrastructure (VDI) or hardened environments for HMI programming to limit credential exposure. Educate staff about the risks of local credential exposure and enforce strong endpoint security policies. Additionally, organizations should engage with Mitsubishi Electric for updates and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2025-09-26T00:33:52.645Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6942060f473cb759e1e34e26

Added to database: 12/17/2025, 1:23:27 AM

Last enriched: 12/24/2025, 4:47:40 AM

Last updated: 2/5/2026, 5:51:33 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats