CVE-2025-11009: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GT Designer3 Version1 (GOT2000)
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using the obtained credentials.
AI Analysis
Technical Summary
CVE-2025-11009 is a vulnerability classified under CWE-312 (Cleartext Storage of Sensitive Information) found in Mitsubishi Electric Corporation's GT Designer3 Version1 software, which is used to program and configure Human Machine Interfaces (HMIs) in the GOT2000 and GOT1000 series. The vulnerability affects all versions of the software and involves the insecure storage of sensitive credentials in plaintext within project files. These project files, which are used to configure HMI devices, contain authentication credentials that are not encrypted or otherwise protected. A local attacker without authentication privileges can access these project files and extract the plaintext credentials. With these credentials, the attacker can illegitimately operate or manipulate the GOT2000 or GOT1000 series devices, potentially impacting industrial control processes. The vulnerability has a CVSS 3.1 base score of 5.1, indicating medium severity. The attack vector is local (AV:L), meaning physical or logical local access is required. The attack complexity is high (AC:H), suggesting that exploitation requires specific conditions or knowledge. No privileges are required (PR:N), and no user interaction is needed (UI:N). The impact is high on confidentiality (C:H) but does not affect integrity or availability. There are no patches currently available, and no known exploits have been reported in the wild. This vulnerability highlights a significant security weakness in how sensitive information is stored within industrial automation software, posing risks of unauthorized device control if local access is obtained.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that rely on Mitsubishi Electric's GOT2000 and GOT1000 HMI devices, this vulnerability poses a risk of unauthorized access and control over industrial processes. The cleartext storage of credentials means that any insider threat or attacker who gains local access to engineering workstations or project files can extract sensitive authentication data. This could lead to unauthorized manipulation of industrial equipment, potentially causing operational disruptions, safety hazards, or production downtime. The confidentiality breach could also facilitate further lateral movement within industrial networks. Given the high attack complexity and local access requirement, remote exploitation is unlikely without prior network or physical compromise. However, the lack of encryption for credentials represents a fundamental security flaw that undermines trust in the affected software. European organizations with stringent regulatory requirements for industrial cybersecurity (e.g., NIS Directive compliance) may face compliance risks if this vulnerability is not addressed promptly.
Mitigation Recommendations
1. Restrict local access to engineering workstations and project files to authorized personnel only, implementing strict physical and logical access controls. 2. Implement full disk encryption and secure storage solutions for project files to prevent unauthorized reading of sensitive data. 3. Regularly audit and monitor access logs on systems running GT Designer3 to detect any unauthorized file access or copying. 4. Use network segmentation to isolate engineering workstations from general IT and operational networks, limiting lateral movement opportunities. 5. Where possible, apply application whitelisting and endpoint protection to prevent unauthorized tools from accessing or extracting project files. 6. Engage with Mitsubishi Electric for updates or patches addressing this vulnerability and plan for timely deployment once available. 7. Educate staff on the risks of storing sensitive credentials in plaintext and promote best practices for credential management. 8. Consider implementing multi-factor authentication on devices and systems that support it to reduce the impact of credential compromise. 9. Backup project files securely and maintain version control to detect unauthorized modifications. 10. Conduct regular security assessments and penetration tests focusing on industrial control system environments to identify and remediate similar weaknesses.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden
CVE-2025-11009: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GT Designer3 Version1 (GOT2000)
Description
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using the obtained credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-11009 is a vulnerability classified under CWE-312 (Cleartext Storage of Sensitive Information) found in Mitsubishi Electric Corporation's GT Designer3 Version1 software, which is used to program and configure Human Machine Interfaces (HMIs) in the GOT2000 and GOT1000 series. The vulnerability affects all versions of the software and involves the insecure storage of sensitive credentials in plaintext within project files. These project files, which are used to configure HMI devices, contain authentication credentials that are not encrypted or otherwise protected. A local attacker without authentication privileges can access these project files and extract the plaintext credentials. With these credentials, the attacker can illegitimately operate or manipulate the GOT2000 or GOT1000 series devices, potentially impacting industrial control processes. The vulnerability has a CVSS 3.1 base score of 5.1, indicating medium severity. The attack vector is local (AV:L), meaning physical or logical local access is required. The attack complexity is high (AC:H), suggesting that exploitation requires specific conditions or knowledge. No privileges are required (PR:N), and no user interaction is needed (UI:N). The impact is high on confidentiality (C:H) but does not affect integrity or availability. There are no patches currently available, and no known exploits have been reported in the wild. This vulnerability highlights a significant security weakness in how sensitive information is stored within industrial automation software, posing risks of unauthorized device control if local access is obtained.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that rely on Mitsubishi Electric's GOT2000 and GOT1000 HMI devices, this vulnerability poses a risk of unauthorized access and control over industrial processes. The cleartext storage of credentials means that any insider threat or attacker who gains local access to engineering workstations or project files can extract sensitive authentication data. This could lead to unauthorized manipulation of industrial equipment, potentially causing operational disruptions, safety hazards, or production downtime. The confidentiality breach could also facilitate further lateral movement within industrial networks. Given the high attack complexity and local access requirement, remote exploitation is unlikely without prior network or physical compromise. However, the lack of encryption for credentials represents a fundamental security flaw that undermines trust in the affected software. European organizations with stringent regulatory requirements for industrial cybersecurity (e.g., NIS Directive compliance) may face compliance risks if this vulnerability is not addressed promptly.
Mitigation Recommendations
1. Restrict local access to engineering workstations and project files to authorized personnel only, implementing strict physical and logical access controls. 2. Implement full disk encryption and secure storage solutions for project files to prevent unauthorized reading of sensitive data. 3. Regularly audit and monitor access logs on systems running GT Designer3 to detect any unauthorized file access or copying. 4. Use network segmentation to isolate engineering workstations from general IT and operational networks, limiting lateral movement opportunities. 5. Where possible, apply application whitelisting and endpoint protection to prevent unauthorized tools from accessing or extracting project files. 6. Engage with Mitsubishi Electric for updates or patches addressing this vulnerability and plan for timely deployment once available. 7. Educate staff on the risks of storing sensitive credentials in plaintext and promote best practices for credential management. 8. Consider implementing multi-factor authentication on devices and systems that support it to reduce the impact of credential compromise. 9. Backup project files securely and maintain version control to detect unauthorized modifications. 10. Conduct regular security assessments and penetration tests focusing on industrial control system environments to identify and remediate similar weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-09-26T00:33:52.645Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6942060f473cb759e1e34e26
Added to database: 12/17/2025, 1:23:27 AM
Last enriched: 12/17/2025, 1:38:15 AM
Last updated: 12/17/2025, 4:03:39 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14305: CWE-863 Incorrect Authorization in Acer ListCheck.exe
HighCVE-2025-14304: CWE-693 Protection Mechanism Failure in ASRock Intel 500 chipset motherboard
HighCVE-2025-13977: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-14303: CWE-693 Protection Mechanism Failure in MSI Intel 600 chipset motherboard
HighCVE-2025-14302: CWE-693 Protection Mechanism Failure in GIGABYTE intel 600 chipset Motherboard
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.