Skip to main content

CVE-2025-7731: CWE-319 Cleartext Transmission of Sensitive Information in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES

High
VulnerabilityCVE-2025-7731cvecve-2025-7731cwe-319
Published: Mon Sep 01 2025 (09/01/2025, 03:57:49 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC iQ-F Series FX5U-32MT/ES

Description

Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to obtain credential information by intercepting SLMP communication messages, and read or write the device values of the product and stop the operations of programs by using the obtained credential information.

AI-Powered Analysis

AILast updated: 09/01/2025, 04:17:46 UTC

Technical Analysis

CVE-2025-7731 is a high-severity vulnerability affecting all versions of the Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES CPU modules. The core issue is the cleartext transmission of sensitive information over the SLMP (Seamless Message Protocol) communication channel. This vulnerability allows a remote, unauthenticated attacker to intercept network traffic and extract credential information without needing any prior access or user interaction. With these credentials, the attacker can read or write device values and even halt program operations on the affected PLC (Programmable Logic Controller). The vulnerability is classified under CWE-319, which pertains to the transmission of sensitive data in cleartext, making it susceptible to eavesdropping and interception. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low complexity, no privileges or user interaction required, and a significant confidentiality impact. However, integrity and availability impacts are rated as none in the CVSS vector, though the description indicates the attacker can stop program operations, which may imply some availability impact. The lack of authentication and encryption in SLMP communications is the root cause, exposing critical industrial control system components to potential espionage and manipulation. No patches or known exploits in the wild have been reported as of the publication date, but the vulnerability poses a serious risk to industrial environments relying on these PLCs for automation and control.

Potential Impact

For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors using Mitsubishi Electric's MELSEC iQ-F Series PLCs, this vulnerability presents a significant risk. Attackers could intercept network traffic within industrial control system (ICS) environments to steal credentials, leading to unauthorized access and manipulation of control processes. This could cause operational disruptions, production downtime, and safety hazards. The ability to stop program operations remotely could lead to denial of service conditions in critical industrial processes. Additionally, the exposure of credentials could facilitate further lateral movement within ICS networks or combined IT/OT environments, increasing the attack surface. Given the increasing integration of ICS with corporate networks in Europe, the risk of cascading effects impacting business continuity and safety is elevated. The confidentiality breach also risks intellectual property theft and competitive disadvantage. The absence of authentication requirements and the ease of exploitation further amplify the threat to European industrial operators.

Mitigation Recommendations

European organizations should implement network segmentation to isolate MELSEC iQ-F Series PLCs from general IT networks and restrict SLMP protocol traffic to trusted management stations only. Employing VPNs or secure tunnels with encryption for SLMP communications can mitigate the cleartext transmission risk. Where possible, deploying network intrusion detection systems (NIDS) with signatures or anomaly detection for SLMP traffic can help identify suspicious interception attempts. Organizations should conduct thorough network traffic audits to detect unencrypted SLMP messages and unauthorized access attempts. Since no patches are currently available, Mitsubishi Electric customers should engage with the vendor for firmware updates or security advisories. Additionally, enforcing strict physical security controls around ICS network infrastructure and limiting access to authorized personnel reduces exposure. Implementing multi-factor authentication (MFA) for access to management interfaces, even if not natively supported by the PLC, via gateway devices or supervisory systems can add a layer of defense. Finally, regular security awareness training for ICS operators about network risks and monitoring for unusual PLC behavior is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2025-07-16T22:31:25.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b51adfad5a09ad00c81c64

Added to database: 9/1/2025, 4:02:39 AM

Last enriched: 9/1/2025, 4:17:46 AM

Last updated: 9/1/2025, 4:17:46 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats