Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15080: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU

0
High
VulnerabilityCVE-2025-15080cvecve-2025-15080cwe-1284
Published: Thu Feb 05 2026 (02/05/2026, 05:16:53 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC iQ-R Series R08PCPU

Description

Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric MELSEC iQ-R Series R08PCPU, R16PCPU, R32PCPU, and R120PCPU allows an unauthenticated attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial of service (DoS) condition on the affected product by sending a specially crafted packet containing a specific command to the affected product.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:24:51 UTC

Technical Analysis

CVE-2025-15080 is a vulnerability classified under CWE-1284 (Improper Validation of Specified Quantity in Input) found in Mitsubishi Electric Corporation's MELSEC iQ-R Series programmable logic controllers (PLCs), specifically models R08PCPU, R16PCPU, R32PCPU, and R120PCPU running firmware version 48 or earlier. The flaw allows an unauthenticated attacker to send specially crafted packets containing specific commands that exploit improper input validation mechanisms. This exploitation can lead to unauthorized reading of device data or portions of the control program, unauthorized writing or modification of device data, or triggering a denial of service (DoS) condition that disrupts the device's operation. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with no privileges or user interaction needed. The vulnerability affects critical industrial control systems that rely on these PLCs for automation and process control, potentially allowing attackers to manipulate industrial processes, steal sensitive operational data, or cause system outages. No known exploits have been reported in the wild yet, and no patches are currently linked, indicating the need for vigilance and proactive mitigation. The improper validation likely involves insufficient checks on the quantity or size parameters in input commands, enabling buffer overreads, unauthorized memory access, or logic errors leading to the described impacts. This vulnerability highlights the importance of robust input validation in industrial control system firmware to prevent remote manipulation and disruption.

Potential Impact

For European organizations, this vulnerability poses a significant threat to industrial automation environments, including manufacturing plants, utilities, and critical infrastructure sectors that utilize Mitsubishi MELSEC iQ-R Series PLCs. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, manipulation of control logic causing production errors or safety incidents, and denial of service conditions that halt critical processes. This could result in financial losses, safety hazards, regulatory non-compliance, and reputational damage. Given the unauthenticated remote exploitability, attackers could leverage this vulnerability to gain initial footholds or disrupt operations without needing insider access. The impact is particularly severe for sectors with high reliance on these PLCs for real-time control and monitoring, such as automotive manufacturing, energy production, water treatment, and transportation systems. The potential for cascading failures or safety incidents elevates the risk profile. Additionally, the lack of current patches increases exposure time, necessitating immediate compensating controls. The vulnerability also raises concerns about supply chain security and the resilience of European industrial control systems against sophisticated cyberattacks.

Mitigation Recommendations

1. Inventory and Identify: Conduct a thorough asset inventory to identify all Mitsubishi MELSEC iQ-R Series PLCs running firmware version 48 or earlier. 2. Network Segmentation: Isolate affected PLCs on dedicated industrial networks with strict access controls to limit exposure to untrusted networks and reduce attack surface. 3. Access Controls: Implement strict firewall rules and access control lists (ACLs) to restrict network traffic to and from the PLCs only to authorized management systems and operators. 4. Monitoring and Detection: Deploy network monitoring solutions capable of detecting anomalous or malformed packets targeting the PLCs, focusing on unusual command sequences or traffic patterns. 5. Vendor Coordination: Engage with Mitsubishi Electric Corporation for official patches or firmware updates addressing CVE-2025-15080 and plan timely deployment once available. 6. Incident Response Preparation: Develop and test incident response plans specific to industrial control system compromises, including procedures for isolating affected devices and restoring operations. 7. Configuration Hardening: Review and harden PLC configurations to disable unnecessary services or protocols that could be exploited. 8. Physical Security: Ensure physical security controls prevent unauthorized access to PLC hardware. 9. Employee Training: Educate operational technology (OT) personnel on the vulnerability and safe handling practices to avoid inadvertent exposure. 10. Vendor Firmware Validation: Before applying updates, validate firmware integrity and authenticity to prevent supply chain compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Mitsubishi
Date Reserved
2025-12-25T08:29:39.662Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69842e66f9fa50a62f04ce53

Added to database: 2/5/2026, 5:45:10 AM

Last enriched: 2/12/2026, 7:24:51 AM

Last updated: 3/22/2026, 10:09:41 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses