Skip to main content

CVE-2025-7376: CWE-64 Windows Shortcut Following (.LNK) in Mitsubishi Electric Corporation GENESIS64

Medium
VulnerabilityCVE-2025-7376cvecve-2025-7376cwe-64
Published: Wed Aug 06 2025 (08/06/2025, 06:28:41 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: GENESIS64

Description

Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.

AI-Powered Analysis

AILast updated: 08/06/2025, 07:03:21 UTC

Technical Analysis

CVE-2025-7376 is a vulnerability identified in multiple Mitsubishi Electric Corporation products, including GENESIS64 (all versions), GENESIS version 11.00, and MC Works64 (all versions). The vulnerability is classified under CWE-64, which pertains to improper control of a resource through symbolic links. Specifically, this issue arises from the way these products handle Windows Shortcut (.LNK) files. An authenticated local attacker can exploit this vulnerability by creating a symbolic link from a file that the affected processes use as a write destination to an arbitrary target file elsewhere on the system. When the process writes to the linked file, it inadvertently overwrites or destroys the target file. This unauthorized write capability can lead to the destruction of critical files necessary for system or application operation, potentially causing a denial-of-service (DoS) condition on the affected PC. The vulnerability requires local authentication and some user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N). The CVSS score is 5.9, indicating a medium severity level. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. While no known exploits are currently in the wild, the vulnerability poses a significant risk due to the potential for file destruction and operational disruption in industrial control and automation environments where these Mitsubishi Electric products are deployed.

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, energy, and utilities that rely on Mitsubishi Electric's GENESIS64 and related products for supervisory control and data acquisition (SCADA) and industrial automation, this vulnerability could have serious operational impacts. The ability for a local authenticated attacker to overwrite critical files can disrupt control systems, leading to downtime, loss of operational data, and potentially unsafe conditions if automated processes fail. This could result in production halts, financial losses, and safety risks. Additionally, the destruction of files may complicate recovery efforts and incident response. Given the critical role of these systems in infrastructure and industrial environments, even a medium severity vulnerability warrants prompt attention to prevent escalation or exploitation in targeted attacks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict local access to systems running affected Mitsubishi Electric products to trusted personnel only, minimizing the risk of an authenticated attacker. 2) Employ strict file system permissions and access controls to limit the ability to create symbolic links or manipulate shortcut files within the environment. 3) Monitor and audit file system changes, especially the creation of symbolic links and modifications to critical files used by GENESIS64 and related applications. 4) Implement application whitelisting and endpoint protection solutions capable of detecting suspicious symbolic link activities or unauthorized file writes. 5) Segregate industrial control systems from general IT networks to reduce the attack surface and limit lateral movement opportunities. 6) Regularly back up critical configuration and operational files to enable rapid restoration in case of file destruction. 7) Engage with Mitsubishi Electric for patches or updates as they become available, and apply them promptly. 8) Train staff on the risks of local privilege misuse and the importance of adhering to security policies to prevent unauthorized access or actions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2025-07-09T02:02:37.759Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6892fa91ad5a09ad00eea6c8

Added to database: 8/6/2025, 6:47:45 AM

Last enriched: 8/6/2025, 7:03:21 AM

Last updated: 8/9/2025, 8:55:40 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats