CVE-2025-7405: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to read or write the device values of the product and stop the operation of the programs, since MODBUS/TCP in the products does not have authentication features.
AI Analysis
Technical Summary
CVE-2025-7405 is a high-severity vulnerability affecting Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES CPU modules, specifically versions 1.060 and later. The core issue is a Missing Authentication for Critical Function (CWE-306) in the MODBUS/TCP implementation used by these devices. MODBUS/TCP is a widely used industrial communication protocol for supervisory control and data acquisition (SCADA) systems and programmable logic controllers (PLCs). In this case, the protocol lacks any authentication mechanism, allowing remote unauthenticated attackers to connect to the device over the network and perform unauthorized read and write operations on device values. This includes the ability to stop running programs on the PLC, effectively disrupting industrial processes controlled by the device. The vulnerability is exploitable remotely without any user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, as attackers can both read sensitive device data and alter operational parameters, potentially causing physical process disruptions or safety hazards. Although no known exploits are currently reported in the wild, the ease of exploitation and critical nature of the functions exposed make this a significant threat to industrial environments relying on these PLCs. The absence of authentication in MODBUS/TCP communications is a fundamental security flaw that undermines trust in the device's operational security. Given the critical role of these PLCs in automation and control systems, exploitation could lead to operational downtime, safety incidents, or damage to equipment.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a substantial risk. The ability for an unauthenticated attacker to remotely manipulate PLC operations could lead to production halts, safety system failures, or physical damage to machinery. Confidentiality breaches could expose sensitive operational data, while integrity violations could alter process parameters, causing unsafe or suboptimal operations. Availability impacts could disrupt supply chains and critical services. Given Europe's strong industrial base and reliance on automation, exploitation could have cascading effects on economic activities and public safety. Organizations operating MELSEC iQ-F Series PLCs must consider the potential for targeted attacks, especially in environments where network segmentation or monitoring is insufficient. The lack of authentication also increases the risk from insider threats or lateral movement by attackers who gain initial network access.
Mitigation Recommendations
1. Network Segmentation: Isolate MELSEC iQ-F Series PLCs on dedicated, secure network segments with strict access controls to limit exposure to untrusted networks. 2. Implement Firewalls and Access Control Lists (ACLs): Restrict MODBUS/TCP traffic to only trusted management stations and supervisory systems. 3. Use VPNs or Encrypted Tunnels: Where remote access is necessary, employ secure VPNs or encrypted communication channels to protect MODBUS/TCP traffic and add authentication layers. 4. Monitor Network Traffic: Deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MODBUS/TCP activity indicative of unauthorized access attempts. 5. Vendor Coordination: Engage with Mitsubishi Electric for firmware updates or patches addressing this vulnerability; if none are available, request timelines and interim mitigations. 6. Implement Application Whitelisting and Process Monitoring: Detect unauthorized changes or stoppage of PLC programs. 7. Conduct Regular Security Audits: Verify that no unauthorized devices or users have access to the control network. 8. Incident Response Planning: Prepare for potential exploitation scenarios with clear procedures to isolate affected devices and restore safe operations.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Czech Republic
CVE-2025-7405: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Description
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to read or write the device values of the product and stop the operation of the programs, since MODBUS/TCP in the products does not have authentication features.
AI-Powered Analysis
Technical Analysis
CVE-2025-7405 is a high-severity vulnerability affecting Mitsubishi Electric Corporation's MELSEC iQ-F Series FX5U-32MT/ES CPU modules, specifically versions 1.060 and later. The core issue is a Missing Authentication for Critical Function (CWE-306) in the MODBUS/TCP implementation used by these devices. MODBUS/TCP is a widely used industrial communication protocol for supervisory control and data acquisition (SCADA) systems and programmable logic controllers (PLCs). In this case, the protocol lacks any authentication mechanism, allowing remote unauthenticated attackers to connect to the device over the network and perform unauthorized read and write operations on device values. This includes the ability to stop running programs on the PLC, effectively disrupting industrial processes controlled by the device. The vulnerability is exploitable remotely without any user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, as attackers can both read sensitive device data and alter operational parameters, potentially causing physical process disruptions or safety hazards. Although no known exploits are currently reported in the wild, the ease of exploitation and critical nature of the functions exposed make this a significant threat to industrial environments relying on these PLCs. The absence of authentication in MODBUS/TCP communications is a fundamental security flaw that undermines trust in the device's operational security. Given the critical role of these PLCs in automation and control systems, exploitation could lead to operational downtime, safety incidents, or damage to equipment.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a substantial risk. The ability for an unauthenticated attacker to remotely manipulate PLC operations could lead to production halts, safety system failures, or physical damage to machinery. Confidentiality breaches could expose sensitive operational data, while integrity violations could alter process parameters, causing unsafe or suboptimal operations. Availability impacts could disrupt supply chains and critical services. Given Europe's strong industrial base and reliance on automation, exploitation could have cascading effects on economic activities and public safety. Organizations operating MELSEC iQ-F Series PLCs must consider the potential for targeted attacks, especially in environments where network segmentation or monitoring is insufficient. The lack of authentication also increases the risk from insider threats or lateral movement by attackers who gain initial network access.
Mitigation Recommendations
1. Network Segmentation: Isolate MELSEC iQ-F Series PLCs on dedicated, secure network segments with strict access controls to limit exposure to untrusted networks. 2. Implement Firewalls and Access Control Lists (ACLs): Restrict MODBUS/TCP traffic to only trusted management stations and supervisory systems. 3. Use VPNs or Encrypted Tunnels: Where remote access is necessary, employ secure VPNs or encrypted communication channels to protect MODBUS/TCP traffic and add authentication layers. 4. Monitor Network Traffic: Deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous MODBUS/TCP activity indicative of unauthorized access attempts. 5. Vendor Coordination: Engage with Mitsubishi Electric for firmware updates or patches addressing this vulnerability; if none are available, request timelines and interim mitigations. 6. Implement Application Whitelisting and Process Monitoring: Detect unauthorized changes or stoppage of PLC programs. 7. Conduct Regular Security Audits: Verify that no unauthorized devices or users have access to the control network. 8. Incident Response Planning: Prepare for potential exploitation scenarios with clear procedures to isolate affected devices and restore safe operations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-07-10T05:59:41.803Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b51adfad5a09ad00c81c5f
Added to database: 9/1/2025, 4:02:39 AM
Last enriched: 9/8/2025, 6:46:47 AM
Last updated: 10/17/2025, 12:22:00 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-23073: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation Mediawiki - GlobalBlocking Extension
LowCVE-2025-62504: CWE-416: Use After Free in envoyproxy envoy
MediumCVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid
MediumCVE-2024-42192: CWE-522 Insufficiently Protected Credentials in HCL Software Traveler for Microsoft Outlook
MediumHackers exploit Cisco SNMP flaw to deploy rootkit on switches
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.