CVE-2025-15080: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric MELSEC iQ-R Series R08PCPU, R16PCPU, R32PCPU, and R120PCPU allows an unauthenticated attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial of service (DoS) condition on the affected product by sending a specially crafted packet containing a specific command to the affected product.
AI Analysis
Technical Summary
CVE-2025-15080 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) found in Mitsubishi Electric Corporation's MELSEC iQ-R Series programmable logic controllers (PLCs), specifically models R08PCPU, R16PCPU, R32PCPU, and R120PCPU running firmware version 48 or earlier. The flaw allows an unauthenticated attacker to send specially crafted packets containing specific commands that exploit improper input validation mechanisms. This exploitation can lead to unauthorized reading of device data or portions of the control program, unauthorized writing or modification of device data, or triggering a denial of service (DoS) condition that disrupts the device's operation. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with no privileges or user interaction needed. The vulnerability affects critical industrial control systems that rely on these PLCs for automation and process control, potentially allowing attackers to manipulate industrial processes, steal sensitive operational data, or cause system outages. No known exploits have been reported in the wild yet, and no patches are currently linked, indicating the need for vigilance and proactive mitigation. The improper validation likely involves insufficient checks on the quantity or size parameters in input commands, enabling buffer overreads, unauthorized memory access, or logic errors leading to the described impacts. This vulnerability highlights the importance of robust input validation in industrial control system firmware to prevent remote manipulation and disruption.
Potential Impact
For European organizations, this vulnerability poses a significant threat to industrial automation environments, including manufacturing plants, utilities, and critical infrastructure sectors that utilize Mitsubishi MELSEC iQ-R Series PLCs. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, manipulation of control logic causing production errors or safety incidents, and denial of service conditions that halt critical processes. This could result in financial losses, safety hazards, regulatory non-compliance, and reputational damage. Given the unauthenticated remote exploitability, attackers could leverage this vulnerability to gain initial footholds or disrupt operations without needing insider access. The impact is particularly severe for sectors with high reliance on these PLCs for real-time control and monitoring, such as automotive manufacturing, energy production, water treatment, and transportation systems. The potential for cascading failures or safety incidents elevates the risk profile. Additionally, the lack of current patches increases exposure time, necessitating immediate compensating controls. The vulnerability also raises concerns about supply chain security and the resilience of European industrial control systems against sophisticated cyberattacks.
Mitigation Recommendations
1. Inventory and Identify: Conduct a thorough asset inventory to identify all Mitsubishi MELSEC iQ-R Series PLCs running firmware version 48 or earlier. 2. Network Segmentation: Isolate affected PLCs on dedicated industrial networks with strict access controls to limit exposure to untrusted networks and reduce attack surface. 3. Access Controls: Implement strict firewall rules and access control lists (ACLs) to restrict network traffic to and from the PLCs only to authorized management systems and operators. 4. Monitoring and Detection: Deploy network monitoring solutions capable of detecting anomalous or malformed packets targeting the PLCs, focusing on unusual command sequences or traffic patterns. 5. Vendor Coordination: Engage with Mitsubishi Electric Corporation for official patches or firmware updates addressing CVE-2025-15080 and plan timely deployment once available. 6. Incident Response Preparation: Develop and test incident response plans specific to industrial control system compromises, including procedures for isolating affected devices and restoring operations. 7. Configuration Hardening: Review and harden PLC configurations to disable unnecessary services or protocols that could be exploited. 8. Physical Security: Ensure physical security controls prevent unauthorized access to PLC hardware. 9. Employee Training: Educate operational technology (OT) personnel on the vulnerability and safe handling practices to avoid inadvertent exposure. 10. Vendor Firmware Validation: Before applying updates, validate firmware integrity and authenticity to prevent supply chain compromise.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-15080: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU
Description
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric MELSEC iQ-R Series R08PCPU, R16PCPU, R32PCPU, and R120PCPU allows an unauthenticated attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial of service (DoS) condition on the affected product by sending a specially crafted packet containing a specific command to the affected product.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15080 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) found in Mitsubishi Electric Corporation's MELSEC iQ-R Series programmable logic controllers (PLCs), specifically models R08PCPU, R16PCPU, R32PCPU, and R120PCPU running firmware version 48 or earlier. The flaw allows an unauthenticated attacker to send specially crafted packets containing specific commands that exploit improper input validation mechanisms. This exploitation can lead to unauthorized reading of device data or portions of the control program, unauthorized writing or modification of device data, or triggering a denial of service (DoS) condition that disrupts the device's operation. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with no privileges or user interaction needed. The vulnerability affects critical industrial control systems that rely on these PLCs for automation and process control, potentially allowing attackers to manipulate industrial processes, steal sensitive operational data, or cause system outages. No known exploits have been reported in the wild yet, and no patches are currently linked, indicating the need for vigilance and proactive mitigation. The improper validation likely involves insufficient checks on the quantity or size parameters in input commands, enabling buffer overreads, unauthorized memory access, or logic errors leading to the described impacts. This vulnerability highlights the importance of robust input validation in industrial control system firmware to prevent remote manipulation and disruption.
Potential Impact
For European organizations, this vulnerability poses a significant threat to industrial automation environments, including manufacturing plants, utilities, and critical infrastructure sectors that utilize Mitsubishi MELSEC iQ-R Series PLCs. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, manipulation of control logic causing production errors or safety incidents, and denial of service conditions that halt critical processes. This could result in financial losses, safety hazards, regulatory non-compliance, and reputational damage. Given the unauthenticated remote exploitability, attackers could leverage this vulnerability to gain initial footholds or disrupt operations without needing insider access. The impact is particularly severe for sectors with high reliance on these PLCs for real-time control and monitoring, such as automotive manufacturing, energy production, water treatment, and transportation systems. The potential for cascading failures or safety incidents elevates the risk profile. Additionally, the lack of current patches increases exposure time, necessitating immediate compensating controls. The vulnerability also raises concerns about supply chain security and the resilience of European industrial control systems against sophisticated cyberattacks.
Mitigation Recommendations
1. Inventory and Identify: Conduct a thorough asset inventory to identify all Mitsubishi MELSEC iQ-R Series PLCs running firmware version 48 or earlier. 2. Network Segmentation: Isolate affected PLCs on dedicated industrial networks with strict access controls to limit exposure to untrusted networks and reduce attack surface. 3. Access Controls: Implement strict firewall rules and access control lists (ACLs) to restrict network traffic to and from the PLCs only to authorized management systems and operators. 4. Monitoring and Detection: Deploy network monitoring solutions capable of detecting anomalous or malformed packets targeting the PLCs, focusing on unusual command sequences or traffic patterns. 5. Vendor Coordination: Engage with Mitsubishi Electric Corporation for official patches or firmware updates addressing CVE-2025-15080 and plan timely deployment once available. 6. Incident Response Preparation: Develop and test incident response plans specific to industrial control system compromises, including procedures for isolating affected devices and restoring operations. 7. Configuration Hardening: Review and harden PLC configurations to disable unnecessary services or protocols that could be exploited. 8. Physical Security: Ensure physical security controls prevent unauthorized access to PLC hardware. 9. Employee Training: Educate operational technology (OT) personnel on the vulnerability and safe handling practices to avoid inadvertent exposure. 10. Vendor Firmware Validation: Before applying updates, validate firmware integrity and authenticity to prevent supply chain compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-12-25T08:29:39.662Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69842e66f9fa50a62f04ce53
Added to database: 2/5/2026, 5:45:10 AM
Last enriched: 2/12/2026, 7:24:51 AM
Last updated: 3/22/2026, 10:09:41 AM
Views: 142
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.