CVE-2025-7405: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to read or write the device values of the product and stop the operation of the programs, since MODBUS/TCP in the products does not have authentication features.
AI Analysis
Technical Summary
CVE-2025-7405 is a high-severity vulnerability affecting Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES CPU modules, specifically versions 1.060 and later. The vulnerability arises from the lack of authentication mechanisms in the MODBUS/TCP protocol implementation on these devices. MODBUS/TCP is a widely used industrial communication protocol for supervisory control and data acquisition (SCADA) systems and programmable logic controllers (PLCs). In this case, the absence of authentication allows a remote attacker to connect to the device without credentials and perform unauthorized read and write operations on device values. This includes the ability to stop the execution of running programs on the PLC, effectively disrupting industrial processes controlled by these devices. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating that critical functions are exposed without proper access control. The CVSS 3.1 base score is 7.3, reflecting a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). Although no known exploits are currently reported in the wild, the ease of exploitation and critical nature of the affected functions make this a significant threat to industrial environments relying on these PLCs. The lack of authentication means that any attacker with network access to the MODBUS/TCP interface can manipulate device states, potentially causing operational downtime, safety hazards, or data integrity issues in industrial control systems.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize Mitsubishi MELSEC iQ-F Series PLCs, this vulnerability poses a serious risk. Exploitation could lead to unauthorized control over industrial processes, resulting in production halts, equipment damage, or safety incidents. The ability to stop program execution remotely can disrupt supply chains and operational continuity. Confidentiality impacts, while lower, could expose sensitive operational data or system configurations. Given Europe's strong industrial base and reliance on automation, the vulnerability could affect a wide range of sectors including automotive manufacturing, chemical plants, water treatment facilities, and power generation. Additionally, the interconnected nature of industrial networks and increasing adoption of Industry 4.0 technologies amplify the risk of lateral movement and broader network compromise following exploitation. The absence of authentication also raises concerns about insider threats or compromised internal networks being leveraged to attack these devices. Overall, the vulnerability threatens operational integrity and availability, which are critical for maintaining safety and regulatory compliance in European industrial environments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Network Segmentation: Isolate PLCs and other industrial control devices on dedicated, secured network segments with strict access controls to limit exposure of MODBUS/TCP interfaces to untrusted networks. 2) Access Control Lists (ACLs): Configure firewalls and network devices to restrict MODBUS/TCP traffic only to authorized management stations and control systems. 3) Use of VPNs or Secure Tunnels: Where remote access is necessary, enforce encrypted tunnels with strong authentication to protect communications to PLCs. 4) Monitoring and Anomaly Detection: Deploy industrial intrusion detection systems (IDS) capable of recognizing unauthorized MODBUS commands or unusual traffic patterns indicative of exploitation attempts. 5) Vendor Coordination: Engage with Mitsubishi Electric for firmware updates or patches addressing authentication mechanisms; if unavailable, request guidance or compensating controls. 6) Application Whitelisting and Program Integrity Checks: Implement mechanisms to verify PLC program integrity and detect unauthorized modifications. 7) Incident Response Preparedness: Develop and test response plans specific to industrial control system compromises, including rapid isolation of affected devices. 8) Physical Security: Ensure physical access to PLCs is restricted to prevent direct tampering. These targeted steps go beyond generic advice by focusing on network architecture, monitoring, and vendor engagement tailored to the industrial environment and this specific vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Czech Republic
CVE-2025-7405: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Description
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to read or write the device values of the product and stop the operation of the programs, since MODBUS/TCP in the products does not have authentication features.
AI-Powered Analysis
Technical Analysis
CVE-2025-7405 is a high-severity vulnerability affecting Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES CPU modules, specifically versions 1.060 and later. The vulnerability arises from the lack of authentication mechanisms in the MODBUS/TCP protocol implementation on these devices. MODBUS/TCP is a widely used industrial communication protocol for supervisory control and data acquisition (SCADA) systems and programmable logic controllers (PLCs). In this case, the absence of authentication allows a remote attacker to connect to the device without credentials and perform unauthorized read and write operations on device values. This includes the ability to stop the execution of running programs on the PLC, effectively disrupting industrial processes controlled by these devices. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating that critical functions are exposed without proper access control. The CVSS 3.1 base score is 7.3, reflecting a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). Although no known exploits are currently reported in the wild, the ease of exploitation and critical nature of the affected functions make this a significant threat to industrial environments relying on these PLCs. The lack of authentication means that any attacker with network access to the MODBUS/TCP interface can manipulate device states, potentially causing operational downtime, safety hazards, or data integrity issues in industrial control systems.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize Mitsubishi MELSEC iQ-F Series PLCs, this vulnerability poses a serious risk. Exploitation could lead to unauthorized control over industrial processes, resulting in production halts, equipment damage, or safety incidents. The ability to stop program execution remotely can disrupt supply chains and operational continuity. Confidentiality impacts, while lower, could expose sensitive operational data or system configurations. Given Europe's strong industrial base and reliance on automation, the vulnerability could affect a wide range of sectors including automotive manufacturing, chemical plants, water treatment facilities, and power generation. Additionally, the interconnected nature of industrial networks and increasing adoption of Industry 4.0 technologies amplify the risk of lateral movement and broader network compromise following exploitation. The absence of authentication also raises concerns about insider threats or compromised internal networks being leveraged to attack these devices. Overall, the vulnerability threatens operational integrity and availability, which are critical for maintaining safety and regulatory compliance in European industrial environments.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Network Segmentation: Isolate PLCs and other industrial control devices on dedicated, secured network segments with strict access controls to limit exposure of MODBUS/TCP interfaces to untrusted networks. 2) Access Control Lists (ACLs): Configure firewalls and network devices to restrict MODBUS/TCP traffic only to authorized management stations and control systems. 3) Use of VPNs or Secure Tunnels: Where remote access is necessary, enforce encrypted tunnels with strong authentication to protect communications to PLCs. 4) Monitoring and Anomaly Detection: Deploy industrial intrusion detection systems (IDS) capable of recognizing unauthorized MODBUS commands or unusual traffic patterns indicative of exploitation attempts. 5) Vendor Coordination: Engage with Mitsubishi Electric for firmware updates or patches addressing authentication mechanisms; if unavailable, request guidance or compensating controls. 6) Application Whitelisting and Program Integrity Checks: Implement mechanisms to verify PLC program integrity and detect unauthorized modifications. 7) Incident Response Preparedness: Develop and test response plans specific to industrial control system compromises, including rapid isolation of affected devices. 8) Physical Security: Ensure physical access to PLCs is restricted to prevent direct tampering. These targeted steps go beyond generic advice by focusing on network architecture, monitoring, and vendor engagement tailored to the industrial environment and this specific vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-07-10T05:59:41.803Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b51adfad5a09ad00c81c5f
Added to database: 9/1/2025, 4:02:39 AM
Last enriched: 9/1/2025, 4:18:03 AM
Last updated: 9/1/2025, 4:29:57 AM
Views: 3
Related Threats
CVE-2025-54857: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Seiko Solutions Inc. SkyBridge BASIC MB-A130
CriticalCVE-2025-9763: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-6507: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
CriticalCVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
CriticalCVE-2025-20707: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6853, MT6877, MT6893, MT6899, MT6991, MT8196, MT8676, MT8678, MT8775, MT8786, MT8788E, MT8791T, MT8792, MT8796, MT8883, MT8893
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.