Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5022: CWE-521 Weak Password Requirements in Mitsubishi Electric Corporation PV-DR004J

0
Medium
VulnerabilityCVE-2025-5022cvecve-2025-5022cwe-521
Published: Thu Jul 10 2025 (07/10/2025, 08:33:47 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: PV-DR004J

Description

Weak Password Requirements vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to derive the password from the SSID. In addition, if the product is configured to enable the individual air conditioner control function, an attacker who has access to the Wi-Fi communication between the units by exploiting this vulnerability may be able to execute ECHONET Lite commands to perform operations such as turning the air conditioner on or off and changing the set temperature. The individual air conditioner control function is available only in display unit version 02.00.01 or later and measurement unit version 02.03.01 or later. The affected products discontinued in 2015, support ended in 2020.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:33:56 UTC

Technical Analysis

CVE-2025-5022 is a vulnerability identified in Mitsubishi Electric Corporation's photovoltaic system monitor models PV-DR004J and PV-DR004JA, affecting all versions. The core issue is weak password requirements that allow an attacker within Wi-Fi communication range between the measurement unit and display unit to derive the password directly from the SSID broadcast by the devices. This vulnerability stems from CWE-521, which relates to weak password policies that do not adequately protect authentication credentials. Furthermore, if the product is configured with the individual air conditioner control function (available only in display unit version 02.00.01 or later and measurement unit version 02.03.01 or later), an attacker exploiting this vulnerability can send ECHONET Lite commands over the Wi-Fi link. This enables unauthorized operations such as turning the air conditioner on or off and adjusting temperature settings. The vulnerability does not require user interaction or prior authentication, but the attacker must be within Wi-Fi range, which limits the attack surface to local proximity. The affected products were discontinued in 2015 with support ending in 2020, meaning no official patches or updates are available. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating attack via adjacent network (Wi-Fi), low attack complexity, no privileges or user interaction required, and high confidentiality impact but no integrity or availability impact. No known exploits are reported in the wild as of now. The lack of patch availability combined with the ability to control connected air conditioning units poses a risk of unauthorized control and potential privacy or operational disruptions in environments using these devices.

Potential Impact

For European organizations, especially those operating photovoltaic systems with Mitsubishi Electric's PV-DR004J or PV-DR004JA monitors, this vulnerability presents a moderate risk. The ability to derive passwords from SSIDs compromises confidentiality of the Wi-Fi communication between units, potentially exposing sensitive operational data. More critically, if the individual air conditioner control function is enabled, attackers can manipulate HVAC settings remotely, which could lead to discomfort, energy waste, or disruption of climate-controlled environments such as data centers, offices, or manufacturing facilities. Although the affected products are discontinued and support has ended, many installations may still be operational, particularly in industrial or commercial settings. The requirement for proximity limits large-scale remote exploitation but insider threats or attackers gaining physical proximity could leverage this vulnerability. The lack of integrity and availability impact reduces the risk of system-wide failures, but unauthorized control of HVAC systems can have secondary effects on business continuity and operational efficiency. Confidentiality breaches could also expose operational data that might be sensitive. Overall, the impact is moderate but non-negligible for organizations relying on these systems in Europe.

Mitigation Recommendations

Given the affected products are discontinued and unsupported, organizations should prioritize the following mitigations: 1) Physically secure the locations of the photovoltaic system monitors to prevent unauthorized proximity access to their Wi-Fi communications. 2) Disable the individual air conditioner control function if it is not essential, as this reduces the attack surface by preventing command injection via ECHONET Lite. 3) Where possible, replace the affected PV-DR004J and PV-DR004JA units with newer, supported models that implement stronger password policies and encrypted communications. 4) Implement network segmentation and Wi-Fi access controls to restrict access to the communication channels between units, such as using dedicated secure Wi-Fi networks with strong encryption and authentication. 5) Monitor network traffic for unusual ECHONET Lite commands or unauthorized access attempts to detect exploitation attempts. 6) Educate facility staff about the risks of unauthorized physical access near these devices. 7) If replacement is not immediately feasible, consider deploying external security controls such as Wi-Fi intrusion detection systems or RF shielding to limit attack range. These steps go beyond generic advice by focusing on compensating controls given the lack of patches and the physical proximity requirement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2025-05-21T05:08:50.753Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686f7dd1a83201eaaca69a1e

Added to database: 7/10/2025, 8:46:09 AM

Last enriched: 9/19/2025, 3:33:56 PM

Last updated: 10/9/2025, 11:01:09 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats