Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11774: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Mitsubishi Electric Corporation GENESIS64

0
High
VulnerabilityCVE-2025-11774cvecve-2025-11774cwe-78
Published: Fri Dec 19 2025 (12/19/2025, 00:22:03 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: GENESIS64

Description

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the software keyboard function (hereinafter referred to as "keypad function") of Mitsubishi Electric GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.2 CFR3 and prior, Mitsubishi Electric MobileHMI versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.2 CFR3 and prior, and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute arbitrary executable files (EXE) when a legitimate user uses the keypad function by tampering with the configuration file for the function. This could allow the attacker to disclose, tamper with, delete, or destroy information stored on the PC where the affected product is installed, or cause a denial-of-service (DoS) condition on the system, through the execution of the EXE.

AI-Powered Analysis

AILast updated: 12/26/2025, 04:25:28 UTC

Technical Analysis

CVE-2025-11774 is an OS command injection vulnerability classified under CWE-78 affecting Mitsubishi Electric Corporation's GENESIS64 software suite, including versions 10.97.2 CFR3 and earlier. The vulnerability resides in the keypad function, which allows users to input commands via a software keyboard interface. Due to improper neutralization of special characters in the configuration file that controls this function, a local attacker with limited privileges can manipulate this file to execute arbitrary executable files (EXEs) on the host system. This execution occurs when a legitimate user interacts with the keypad function, effectively leveraging user interaction to trigger the malicious payload. The vulnerability impacts several Mitsubishi Electric products: GENESIS64, Iconics Digital Solutions GENESIS64, ICONICS Suite, MobileHMI, and MC Works64, all prior to or including version 10.97.2 CFR3. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but user interaction (UI:R) is necessary. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), allowing attackers to disclose sensitive information, tamper with or destroy data, or cause denial-of-service conditions. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to systems running these Mitsubishi Electric products, especially in industrial and critical infrastructure environments where GENESIS64 is commonly deployed. The vulnerability was reserved in mid-October 2025 and published in December 2025, with no patches currently linked, indicating a need for immediate attention from affected users.

Potential Impact

For European organizations, the impact of CVE-2025-11774 is substantial, particularly for those in industrial automation, manufacturing, energy, and building management sectors where Mitsubishi Electric's GENESIS64 and related software are widely used. Successful exploitation can lead to unauthorized execution of arbitrary code, resulting in data breaches, manipulation or destruction of critical operational data, and disruption of control systems. This can cause operational downtime, safety hazards, and financial losses. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as insider threats or compromised user accounts could trigger the attack. The high confidentiality impact threatens sensitive industrial process data, while integrity and availability impacts could disrupt production lines or critical infrastructure services. Given the interconnected nature of industrial control systems in Europe, a single compromised node could propagate effects across supply chains or critical services. The lack of known public exploits provides a window for mitigation but also underscores the urgency to address the vulnerability before attackers develop weaponized code.

Mitigation Recommendations

1. Immediately restrict local access to systems running affected Mitsubishi Electric products, ensuring only trusted personnel have login privileges. 2. Implement strict file integrity monitoring and access controls on the keypad function configuration files to detect and prevent unauthorized modifications. 3. Educate users about the risk of interacting with the keypad function and enforce policies to minimize unnecessary use or exposure. 4. Apply principle of least privilege to user accounts to reduce the risk of privilege escalation via this vulnerability. 5. Monitor system logs and behavior for unusual execution of EXE files triggered by keypad interactions. 6. Coordinate with Mitsubishi Electric for timely patches or updates; if unavailable, consider temporary workarounds such as disabling the keypad function or isolating affected systems from critical networks. 7. Conduct regular security audits and penetration tests focusing on local privilege escalation and configuration file tampering vectors. 8. Employ endpoint detection and response (EDR) tools capable of identifying anomalous command execution patterns related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2025-10-15T02:40:54.345Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69449f434eb3efac36bb56a2

Added to database: 12/19/2025, 12:41:39 AM

Last enriched: 12/26/2025, 4:25:28 AM

Last updated: 2/6/2026, 7:16:56 PM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats