CVE-2025-2399: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in Mitsubishi Electric Corporation Mitsubishi Electric CNC M800V Series M800VW
Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric CNC M800V Series M800VW and M800VS, M80V Series M80V and M80VW, M800 Series M800W and M800S, M80 Series M80 and M80W, E80 Series E80, C80 Series C80, M700V Series M750VW, M720VW, 730VW, M720VS, M730VS, and M750VS, M70V Series M70V, E70 Series E70, and Software Tools NC Trainer2 and NC Trainer2 plus allows a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition by sending specially crafted packets to TCP port 683.
AI Analysis
Technical Summary
CVE-2025-2399 is a vulnerability identified in multiple Mitsubishi Electric CNC product lines, including the M800V Series M800VW, M80V Series, M800 Series, M80 Series, E80 Series, C80 Series, M700V Series, M720VW, M730VW, M70V Series, E70 Series, and related software tools NC Trainer2 and NC Trainer2 plus. The root cause is improper validation of specified index, position, or offset in input data, classified under CWE-1285. An attacker can exploit this flaw by sending specially crafted packets to TCP port 683, which the devices use for communication. This malformed input triggers an out-of-bounds read condition, causing the affected system to crash or become unresponsive, resulting in a denial-of-service (DoS) condition. The vulnerability does not allow for code execution, data leakage, or integrity compromise but impacts system availability. The CVSS v3.1 base score is 5.9, with vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating remote network attack with high attack complexity, no privileges or user interaction required, and only availability affected. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. Given the critical role of CNC systems in industrial manufacturing, this DoS can disrupt production lines and cause significant operational delays.
Potential Impact
The primary impact of CVE-2025-2399 is denial of service against Mitsubishi Electric CNC systems, which are widely used in industrial automation and manufacturing sectors globally. Disruption of CNC controllers can halt production processes, leading to financial losses, delayed deliveries, and potential safety risks in industrial environments. Since these systems often operate critical machinery, unplanned downtime can have cascading effects on supply chains and operational continuity. The vulnerability does not compromise confidentiality or integrity, but availability loss in industrial control systems is a serious concern. Attackers do not require authentication or user interaction, making exploitation feasible if network access to TCP port 683 is available. The high attack complexity somewhat limits exploitation to attackers with specific capabilities or network positioning. Organizations relying on these CNC devices without proper network segmentation or access controls are at risk of operational disruption. The lack of known exploits currently reduces immediate threat but does not eliminate future risk, especially as exploit code could be developed once the vulnerability details are public.
Mitigation Recommendations
1. Immediately restrict network access to TCP port 683 on Mitsubishi Electric CNC devices by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2. Employ strict network segmentation to isolate CNC systems from general enterprise and internet-facing networks, reducing the attack surface. 3. Monitor network traffic for unusual or malformed packets targeting port 683, using intrusion detection/prevention systems (IDS/IPS) with custom signatures if possible. 4. Coordinate with Mitsubishi Electric for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 5. Conduct regular security assessments and penetration tests on industrial control networks to identify and remediate exposure to this and similar vulnerabilities. 6. Implement redundancy and failover mechanisms in CNC operations to minimize production impact in case of DoS events. 7. Train operational technology (OT) personnel to recognize signs of CNC system disruptions and respond quickly to minimize downtime. 8. Maintain up-to-date asset inventories to ensure all affected devices are identified and protected accordingly. 9. Consider deploying network anomaly detection solutions tailored for industrial protocols to detect exploitation attempts early.
Affected Countries
Japan, Germany, United States, South Korea, China, Taiwan, Italy, France, United Kingdom, Canada
CVE-2025-2399: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in Mitsubishi Electric Corporation Mitsubishi Electric CNC M800V Series M800VW
Description
Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric CNC M800V Series M800VW and M800VS, M80V Series M80V and M80VW, M800 Series M800W and M800S, M80 Series M80 and M80W, E80 Series E80, C80 Series C80, M700V Series M750VW, M720VW, 730VW, M720VS, M730VS, and M750VS, M70V Series M70V, E70 Series E70, and Software Tools NC Trainer2 and NC Trainer2 plus allows a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition by sending specially crafted packets to TCP port 683.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-2399 is a vulnerability identified in multiple Mitsubishi Electric CNC product lines, including the M800V Series M800VW, M80V Series, M800 Series, M80 Series, E80 Series, C80 Series, M700V Series, M720VW, M730VW, M70V Series, E70 Series, and related software tools NC Trainer2 and NC Trainer2 plus. The root cause is improper validation of specified index, position, or offset in input data, classified under CWE-1285. An attacker can exploit this flaw by sending specially crafted packets to TCP port 683, which the devices use for communication. This malformed input triggers an out-of-bounds read condition, causing the affected system to crash or become unresponsive, resulting in a denial-of-service (DoS) condition. The vulnerability does not allow for code execution, data leakage, or integrity compromise but impacts system availability. The CVSS v3.1 base score is 5.9, with vector AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating remote network attack with high attack complexity, no privileges or user interaction required, and only availability affected. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. Given the critical role of CNC systems in industrial manufacturing, this DoS can disrupt production lines and cause significant operational delays.
Potential Impact
The primary impact of CVE-2025-2399 is denial of service against Mitsubishi Electric CNC systems, which are widely used in industrial automation and manufacturing sectors globally. Disruption of CNC controllers can halt production processes, leading to financial losses, delayed deliveries, and potential safety risks in industrial environments. Since these systems often operate critical machinery, unplanned downtime can have cascading effects on supply chains and operational continuity. The vulnerability does not compromise confidentiality or integrity, but availability loss in industrial control systems is a serious concern. Attackers do not require authentication or user interaction, making exploitation feasible if network access to TCP port 683 is available. The high attack complexity somewhat limits exploitation to attackers with specific capabilities or network positioning. Organizations relying on these CNC devices without proper network segmentation or access controls are at risk of operational disruption. The lack of known exploits currently reduces immediate threat but does not eliminate future risk, especially as exploit code could be developed once the vulnerability details are public.
Mitigation Recommendations
1. Immediately restrict network access to TCP port 683 on Mitsubishi Electric CNC devices by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2. Employ strict network segmentation to isolate CNC systems from general enterprise and internet-facing networks, reducing the attack surface. 3. Monitor network traffic for unusual or malformed packets targeting port 683, using intrusion detection/prevention systems (IDS/IPS) with custom signatures if possible. 4. Coordinate with Mitsubishi Electric for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 5. Conduct regular security assessments and penetration tests on industrial control networks to identify and remediate exposure to this and similar vulnerabilities. 6. Implement redundancy and failover mechanisms in CNC operations to minimize production impact in case of DoS events. 7. Train operational technology (OT) personnel to recognize signs of CNC system disruptions and respond quickly to minimize downtime. 8. Maintain up-to-date asset inventories to ensure all affected devices are identified and protected accordingly. 9. Consider deploying network anomaly detection solutions tailored for industrial protocols to detect exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-03-17T08:30:11.608Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69afa64eea502d3aa8064f3d
Added to database: 3/10/2026, 5:04:14 AM
Last enriched: 3/25/2026, 12:36:08 AM
Last updated: 4/24/2026, 2:02:42 AM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.