CVE-2025-3784: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GX Works2
Cleartext Storage of Sensitive Information Vulnerability in GX Works2 all versions allows an attacker to disclose credential information stored in plaintext from project files. As a result, the attacker may be able to open project files protected by user authentication using disclosed credential information, and obtain or modify project information.
AI Analysis
Technical Summary
CVE-2025-3784 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information. It affects all versions of Mitsubishi Electric Corporation's GX Works2, a software suite used for programming and configuring Mitsubishi PLCs (Programmable Logic Controllers) in industrial automation. The vulnerability arises because credential information used for user authentication is stored in plaintext within project files. An attacker who gains local access to these project files can extract the stored credentials without needing to bypass encryption or other protections. With these credentials, the attacker can open project files that are otherwise protected by user authentication, enabling them to view or modify project configurations. The CVSS v3.1 score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. The vulnerability does not currently have known exploits in the wild, and no patches have been published. The risk is primarily to confidentiality of sensitive project data and credentials, which could lead to unauthorized access and potential manipulation of industrial control system configurations. This vulnerability highlights the importance of secure credential storage and access control in industrial software environments.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that utilize Mitsubishi Electric's GX Works2 software, this vulnerability poses a risk of unauthorized disclosure of sensitive credential information. Such disclosure could enable attackers to access and modify PLC project files, potentially disrupting industrial processes or causing safety hazards. The confidentiality breach could lead to intellectual property theft or sabotage. Since the vulnerability requires local access, the threat is higher in environments where endpoint security is weak or insider threats exist. The lack of integrity and availability impact reduces the risk of direct operational disruption, but unauthorized modifications could indirectly affect system behavior. European organizations with complex supply chains and automation systems may face increased risk if attackers leverage this vulnerability to move laterally or escalate privileges within industrial networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict access controls on systems storing GX Works2 project files, ensuring only authorized personnel can access these files. Employing full disk encryption or file-level encryption can protect sensitive data at rest. Organizations should audit and monitor access to project files to detect unauthorized attempts. Since no patches are currently available, consider isolating engineering workstations and limiting network connectivity to reduce exposure. Educate staff about the risks of storing credentials in plaintext and encourage secure credential management practices. Additionally, consider using external credential vaults or password managers instead of relying on software-stored credentials. Regular backups of project files should be maintained to enable recovery from unauthorized modifications. Finally, coordinate with Mitsubishi Electric for updates or patches addressing this vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-3784: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GX Works2
Description
Cleartext Storage of Sensitive Information Vulnerability in GX Works2 all versions allows an attacker to disclose credential information stored in plaintext from project files. As a result, the attacker may be able to open project files protected by user authentication using disclosed credential information, and obtain or modify project information.
AI-Powered Analysis
Technical Analysis
CVE-2025-3784 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information. It affects all versions of Mitsubishi Electric Corporation's GX Works2, a software suite used for programming and configuring Mitsubishi PLCs (Programmable Logic Controllers) in industrial automation. The vulnerability arises because credential information used for user authentication is stored in plaintext within project files. An attacker who gains local access to these project files can extract the stored credentials without needing to bypass encryption or other protections. With these credentials, the attacker can open project files that are otherwise protected by user authentication, enabling them to view or modify project configurations. The CVSS v3.1 score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. The vulnerability does not currently have known exploits in the wild, and no patches have been published. The risk is primarily to confidentiality of sensitive project data and credentials, which could lead to unauthorized access and potential manipulation of industrial control system configurations. This vulnerability highlights the importance of secure credential storage and access control in industrial software environments.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that utilize Mitsubishi Electric's GX Works2 software, this vulnerability poses a risk of unauthorized disclosure of sensitive credential information. Such disclosure could enable attackers to access and modify PLC project files, potentially disrupting industrial processes or causing safety hazards. The confidentiality breach could lead to intellectual property theft or sabotage. Since the vulnerability requires local access, the threat is higher in environments where endpoint security is weak or insider threats exist. The lack of integrity and availability impact reduces the risk of direct operational disruption, but unauthorized modifications could indirectly affect system behavior. European organizations with complex supply chains and automation systems may face increased risk if attackers leverage this vulnerability to move laterally or escalate privileges within industrial networks.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict access controls on systems storing GX Works2 project files, ensuring only authorized personnel can access these files. Employing full disk encryption or file-level encryption can protect sensitive data at rest. Organizations should audit and monitor access to project files to detect unauthorized attempts. Since no patches are currently available, consider isolating engineering workstations and limiting network connectivity to reduce exposure. Educate staff about the risks of storing credentials in plaintext and encourage secure credential management practices. Additionally, consider using external credential vaults or password managers instead of relying on software-stored credentials. Regular backups of project files should be maintained to enable recovery from unauthorized modifications. Finally, coordinate with Mitsubishi Electric for updates or patches addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-04-18T02:21:50.076Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6927d764d4a4bdffcb26cfeb
Added to database: 11/27/2025, 4:45:24 AM
Last enriched: 11/27/2025, 4:59:31 AM
Last updated: 11/27/2025, 7:38:53 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13441: CWE-862 Missing Authorization in themesupport Hide Category by User Role for WooCommerce
MediumCVE-2025-13157: CWE-639 Authorization Bypass Through User-Controlled Key in qodeinteractive QODE Wishlist for WooCommerce
MediumCVE-2025-12758: Incomplete Filtering of One or More Instances of Special Elements in validator
HighCVE-2025-13525: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in listingthemes WP Directory Kit
MediumCVE-2025-13143: CWE-352 Cross-Site Request Forgery (CSRF) in assafp Poll, Survey & Quiz Maker Plugin by Opinion Stage
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.