CVE-2025-5023: CWE-798 Use of Hard-coded Credentials in Mitsubishi Electric Corporation PV-DR004J
Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to disclose information such as generated power and electricity sold back to the grid stored in the product, tamper with or destroy stored or configured information in the product, or cause a Denial-of-Service (DoS) condition on the product, by using hardcoded user ID and password common to the product series obtained by exploiting CVE-2025-5022. The affected products discontinued in 2015, support ended in 2020.
AI Analysis
Technical Summary
CVE-2025-5023 is a high-severity vulnerability classified under CWE-798, which involves the use of hard-coded credentials in Mitsubishi Electric Corporation's photovoltaic system monitor models PV-DR004J and PV-DR004JA. These products, designed for monitoring solar power generation and electricity sold back to the grid, contain embedded user IDs and passwords common across all versions. An attacker within Wi-Fi communication range between the measurement and display units can exploit this vulnerability to gain unauthorized access without requiring authentication or user interaction. The attacker can disclose sensitive information such as generated power data and electricity sales, tamper with or destroy stored or configured information, or cause a Denial-of-Service (DoS) condition, disrupting the system's availability. This vulnerability is compounded by the prerequisite exploitation of CVE-2025-5022, which presumably allows extraction of these hard-coded credentials. The affected products were discontinued in 2015, with official support ending in 2020, meaning no patches or updates are available to remediate this issue. The CVSS v3.1 score of 7.1 reflects a high severity, with attack vector being adjacent network (Wi-Fi range), high attack complexity, no privileges required, no user interaction, and impacts including low confidentiality, high integrity, and high availability impacts. The vulnerability poses a significant risk to the integrity and availability of photovoltaic monitoring systems, potentially leading to manipulation of energy data and operational disruption.
Potential Impact
For European organizations utilizing Mitsubishi Electric's PV-DR004J and PV-DR004JA photovoltaic monitoring systems, this vulnerability presents several risks. Unauthorized disclosure of energy generation and sales data could lead to privacy breaches or competitive intelligence gathering. More critically, tampering with or destroying stored data can disrupt energy management, billing accuracy, and grid interaction, potentially causing financial losses or regulatory non-compliance. A Denial-of-Service condition could interrupt monitoring capabilities, affecting operational awareness and response to photovoltaic system performance issues. Given the products are discontinued and unsupported, organizations face challenges in remediation, increasing exposure duration. This is particularly concerning for energy providers, commercial solar farm operators, and critical infrastructure entities in Europe relying on these systems for operational integrity and reporting. The vulnerability could also be leveraged in broader supply chain attacks or as a foothold for lateral movement within industrial control environments.
Mitigation Recommendations
Since the affected products are discontinued and unsupported, traditional patching is not an option. European organizations should first inventory and identify any deployments of PV-DR004J and PV-DR004JA units within their infrastructure. Immediate mitigation steps include isolating these devices from Wi-Fi networks accessible to untrusted parties by implementing strict network segmentation and limiting Wi-Fi communication range or disabling wireless interfaces if possible. Employ physical security controls to prevent proximity-based attacks. Where feasible, replace affected units with modern, supported photovoltaic monitoring systems that do not contain hard-coded credentials and support secure authentication mechanisms. Additionally, monitor network traffic for anomalous access patterns or repeated authentication attempts targeting these devices. Implement compensating controls such as VPN tunnels or encrypted communication channels between measurement and display units if supported. Finally, update incident response and business continuity plans to address potential disruptions caused by exploitation of this vulnerability.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, United Kingdom, Poland
CVE-2025-5023: CWE-798 Use of Hard-coded Credentials in Mitsubishi Electric Corporation PV-DR004J
Description
Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to disclose information such as generated power and electricity sold back to the grid stored in the product, tamper with or destroy stored or configured information in the product, or cause a Denial-of-Service (DoS) condition on the product, by using hardcoded user ID and password common to the product series obtained by exploiting CVE-2025-5022. The affected products discontinued in 2015, support ended in 2020.
AI-Powered Analysis
Technical Analysis
CVE-2025-5023 is a high-severity vulnerability classified under CWE-798, which involves the use of hard-coded credentials in Mitsubishi Electric Corporation's photovoltaic system monitor models PV-DR004J and PV-DR004JA. These products, designed for monitoring solar power generation and electricity sold back to the grid, contain embedded user IDs and passwords common across all versions. An attacker within Wi-Fi communication range between the measurement and display units can exploit this vulnerability to gain unauthorized access without requiring authentication or user interaction. The attacker can disclose sensitive information such as generated power data and electricity sales, tamper with or destroy stored or configured information, or cause a Denial-of-Service (DoS) condition, disrupting the system's availability. This vulnerability is compounded by the prerequisite exploitation of CVE-2025-5022, which presumably allows extraction of these hard-coded credentials. The affected products were discontinued in 2015, with official support ending in 2020, meaning no patches or updates are available to remediate this issue. The CVSS v3.1 score of 7.1 reflects a high severity, with attack vector being adjacent network (Wi-Fi range), high attack complexity, no privileges required, no user interaction, and impacts including low confidentiality, high integrity, and high availability impacts. The vulnerability poses a significant risk to the integrity and availability of photovoltaic monitoring systems, potentially leading to manipulation of energy data and operational disruption.
Potential Impact
For European organizations utilizing Mitsubishi Electric's PV-DR004J and PV-DR004JA photovoltaic monitoring systems, this vulnerability presents several risks. Unauthorized disclosure of energy generation and sales data could lead to privacy breaches or competitive intelligence gathering. More critically, tampering with or destroying stored data can disrupt energy management, billing accuracy, and grid interaction, potentially causing financial losses or regulatory non-compliance. A Denial-of-Service condition could interrupt monitoring capabilities, affecting operational awareness and response to photovoltaic system performance issues. Given the products are discontinued and unsupported, organizations face challenges in remediation, increasing exposure duration. This is particularly concerning for energy providers, commercial solar farm operators, and critical infrastructure entities in Europe relying on these systems for operational integrity and reporting. The vulnerability could also be leveraged in broader supply chain attacks or as a foothold for lateral movement within industrial control environments.
Mitigation Recommendations
Since the affected products are discontinued and unsupported, traditional patching is not an option. European organizations should first inventory and identify any deployments of PV-DR004J and PV-DR004JA units within their infrastructure. Immediate mitigation steps include isolating these devices from Wi-Fi networks accessible to untrusted parties by implementing strict network segmentation and limiting Wi-Fi communication range or disabling wireless interfaces if possible. Employ physical security controls to prevent proximity-based attacks. Where feasible, replace affected units with modern, supported photovoltaic monitoring systems that do not contain hard-coded credentials and support secure authentication mechanisms. Additionally, monitor network traffic for anomalous access patterns or repeated authentication attempts targeting these devices. Implement compensating controls such as VPN tunnels or encrypted communication channels between measurement and display units if supported. Finally, update incident response and business continuity plans to address potential disruptions caused by exploitation of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-05-21T05:08:54.662Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686f7dd1a83201eaaca69a21
Added to database: 7/10/2025, 8:46:09 AM
Last enriched: 9/19/2025, 3:34:11 PM
Last updated: 10/9/2025, 10:58:40 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10862: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2025-11522: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Elated-Themes Search & Go - Directory WordPress Theme
CriticalCVE-2025-11539: CWE-94 Improper Control of Generation of Code ('Code Injection') in Grafana grafana-image-renderer
CriticalCVE-2025-7634: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in wptravelengine WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CriticalCVE-2025-7526: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wptravelengine WP Travel Engine – Tour Booking Plugin – Tour Operator Software
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.