CVE-2025-3755: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to read information in the product, to cause a Denial-of-Service (DoS) condition in MELSOFT connection, or to stop the operation of the CPU module (causing a DoS condtion on the CPU module), by sending specially crafted packets. The product is needed to reset for recovery.
AI Analysis
Technical Summary
CVE-2025-3755 is a critical vulnerability identified in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES CPU modules. The root cause is an improper validation of specified index, position, or offset in input data (classified under CWE-1285). This flaw allows a remote, unauthenticated attacker to send specially crafted packets to the affected device, resulting in multiple potential impacts. Firstly, the attacker can read sensitive information from the device, compromising confidentiality. Secondly, the vulnerability can be exploited to cause a Denial-of-Service (DoS) condition on the MELSOFT connection, disrupting communication between the CPU module and the programming/monitoring software. Thirdly, the attacker can stop the operation of the CPU module itself, causing a DoS condition that halts the industrial control processes managed by the PLC. Recovery from such an attack requires a physical reset of the device, indicating that the attack can cause persistent disruption. The CVSS v3.1 base score is 9.1, reflecting the critical nature of this vulnerability. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and availability severely (C:H, A:H), but not integrity (I:N). The vulnerability affects all versions of the FX5U-32MT/ES CPU modules, indicating a widespread exposure. No patches or known exploits in the wild are reported at the time of publication, but the severity and ease of exploitation make this a high-risk issue for industrial environments relying on these PLCs.
Potential Impact
For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors that utilize Mitsubishi Electric's MELSEC iQ-F Series PLCs, this vulnerability poses a significant risk. Exploitation can lead to unauthorized disclosure of operational data, potentially revealing sensitive process information or intellectual property. More critically, the ability to cause DoS conditions on the MELSOFT connection and CPU modules can disrupt industrial automation processes, leading to operational downtime, production losses, safety hazards, and potential cascading effects on supply chains. Given the reliance on these PLCs for real-time control, an attack could also impact safety systems, increasing the risk of physical damage or injury. The requirement for a device reset to recover from the DoS condition means that automated recovery is not possible, potentially prolonging downtime. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. European organizations with interconnected industrial networks or those exposed to external networks are particularly vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Network Segmentation: Isolate MELSEC iQ-F Series PLCs and MELSOFT programming interfaces within dedicated, secure industrial network segments with strict access controls to minimize exposure to untrusted networks. 2) Access Control: Restrict network access to the PLCs to only trusted management stations and authorized personnel using firewalls and network access control lists (ACLs). 3) Monitoring and Anomaly Detection: Deploy network monitoring solutions capable of detecting unusual or malformed packets targeting the PLCs, enabling rapid detection of exploitation attempts. 4) Incident Response Preparedness: Develop and rehearse incident response plans that include procedures for safely resetting affected CPU modules to minimize downtime. 5) Vendor Coordination: Engage with Mitsubishi Electric for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 6) Physical Security: Ensure physical access to PLCs is controlled to prevent unauthorized manual resets or tampering. 7) Network Hardening: Disable unnecessary services and protocols on the PLCs and related devices to reduce the attack surface. 8) Regular Audits: Conduct periodic security assessments of industrial control systems to identify and remediate exposure to this and similar vulnerabilities.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Czech Republic, Sweden
CVE-2025-3755: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Description
Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to read information in the product, to cause a Denial-of-Service (DoS) condition in MELSOFT connection, or to stop the operation of the CPU module (causing a DoS condtion on the CPU module), by sending specially crafted packets. The product is needed to reset for recovery.
AI-Powered Analysis
Technical Analysis
CVE-2025-3755 is a critical vulnerability identified in Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES CPU modules. The root cause is an improper validation of specified index, position, or offset in input data (classified under CWE-1285). This flaw allows a remote, unauthenticated attacker to send specially crafted packets to the affected device, resulting in multiple potential impacts. Firstly, the attacker can read sensitive information from the device, compromising confidentiality. Secondly, the vulnerability can be exploited to cause a Denial-of-Service (DoS) condition on the MELSOFT connection, disrupting communication between the CPU module and the programming/monitoring software. Thirdly, the attacker can stop the operation of the CPU module itself, causing a DoS condition that halts the industrial control processes managed by the PLC. Recovery from such an attack requires a physical reset of the device, indicating that the attack can cause persistent disruption. The CVSS v3.1 base score is 9.1, reflecting the critical nature of this vulnerability. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and availability severely (C:H, A:H), but not integrity (I:N). The vulnerability affects all versions of the FX5U-32MT/ES CPU modules, indicating a widespread exposure. No patches or known exploits in the wild are reported at the time of publication, but the severity and ease of exploitation make this a high-risk issue for industrial environments relying on these PLCs.
Potential Impact
For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors that utilize Mitsubishi Electric's MELSEC iQ-F Series PLCs, this vulnerability poses a significant risk. Exploitation can lead to unauthorized disclosure of operational data, potentially revealing sensitive process information or intellectual property. More critically, the ability to cause DoS conditions on the MELSOFT connection and CPU modules can disrupt industrial automation processes, leading to operational downtime, production losses, safety hazards, and potential cascading effects on supply chains. Given the reliance on these PLCs for real-time control, an attack could also impact safety systems, increasing the risk of physical damage or injury. The requirement for a device reset to recover from the DoS condition means that automated recovery is not possible, potentially prolonging downtime. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. European organizations with interconnected industrial networks or those exposed to external networks are particularly vulnerable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Network Segmentation: Isolate MELSEC iQ-F Series PLCs and MELSOFT programming interfaces within dedicated, secure industrial network segments with strict access controls to minimize exposure to untrusted networks. 2) Access Control: Restrict network access to the PLCs to only trusted management stations and authorized personnel using firewalls and network access control lists (ACLs). 3) Monitoring and Anomaly Detection: Deploy network monitoring solutions capable of detecting unusual or malformed packets targeting the PLCs, enabling rapid detection of exploitation attempts. 4) Incident Response Preparedness: Develop and rehearse incident response plans that include procedures for safely resetting affected CPU modules to minimize downtime. 5) Vendor Coordination: Engage with Mitsubishi Electric for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 6) Physical Security: Ensure physical access to PLCs is controlled to prevent unauthorized manual resets or tampering. 7) Network Hardening: Disable unnecessary services and protocols on the PLCs and related devices to reduce the attack surface. 8) Regular Audits: Conduct periodic security assessments of industrial control systems to identify and remediate exposure to this and similar vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-04-17T07:04:51.773Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6837e96e182aa0cae26cd081
Added to database: 5/29/2025, 4:58:22 AM
Last enriched: 7/7/2025, 4:55:35 AM
Last updated: 7/31/2025, 12:50:20 PM
Views: 60
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.