CVE-2025-7731: CWE-319 Cleartext Transmission of Sensitive Information in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to obtain credential information by intercepting SLMP communication messages, and read or write the device values of the product and stop the operations of programs by using the obtained credential information.
AI Analysis
Technical Summary
CVE-2025-7731 is a high-severity vulnerability affecting all versions of the Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES CPU modules. The core issue is the cleartext transmission of sensitive information over the SLMP (Seamless Message Protocol) communication channel. This vulnerability allows a remote, unauthenticated attacker to intercept network traffic and extract credential information without needing any prior access or user interaction. With these credentials, the attacker can read or write device values and even halt program operations on the affected PLC (Programmable Logic Controller). The vulnerability is classified under CWE-319, which pertains to the transmission of sensitive data in cleartext, making it susceptible to eavesdropping and interception. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low complexity, no privileges or user interaction required, and a significant confidentiality impact. However, integrity and availability impacts are rated as none in the CVSS vector, though the description indicates the attacker can stop program operations, which may imply some availability impact. The lack of authentication and encryption in SLMP communications is the root cause, exposing critical industrial control system components to potential espionage and manipulation. No patches or known exploits in the wild have been reported as of the publication date, but the vulnerability poses a serious risk to industrial environments relying on these PLCs for automation and control.
Potential Impact
For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors using Mitsubishi Electric's MELSEC iQ-F Series PLCs, this vulnerability presents a significant risk. Attackers could intercept network traffic within industrial control system (ICS) environments to steal credentials, leading to unauthorized access and manipulation of control processes. This could cause operational disruptions, production downtime, and safety hazards. The ability to stop program operations remotely could lead to denial of service conditions in critical industrial processes. Additionally, the exposure of credentials could facilitate further lateral movement within ICS networks or combined IT/OT environments, increasing the attack surface. Given the increasing integration of ICS with corporate networks in Europe, the risk of cascading effects impacting business continuity and safety is elevated. The confidentiality breach also risks intellectual property theft and competitive disadvantage. The absence of authentication requirements and the ease of exploitation further amplify the threat to European industrial operators.
Mitigation Recommendations
European organizations should implement network segmentation to isolate MELSEC iQ-F Series PLCs from general IT networks and restrict SLMP protocol traffic to trusted management stations only. Employing VPNs or secure tunnels with encryption for SLMP communications can mitigate the cleartext transmission risk. Where possible, deploying network intrusion detection systems (NIDS) with signatures or anomaly detection for SLMP traffic can help identify suspicious interception attempts. Organizations should conduct thorough network traffic audits to detect unencrypted SLMP messages and unauthorized access attempts. Since no patches are currently available, Mitsubishi Electric customers should engage with the vendor for firmware updates or security advisories. Additionally, enforcing strict physical security controls around ICS network infrastructure and limiting access to authorized personnel reduces exposure. Implementing multi-factor authentication (MFA) for access to management interfaces, even if not natively supported by the PLC, via gateway devices or supervisory systems can add a layer of defense. Finally, regular security awareness training for ICS operators about network risks and monitoring for unusual PLC behavior is recommended.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Sweden, Czech Republic
CVE-2025-7731: CWE-319 Cleartext Transmission of Sensitive Information in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
Description
Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to obtain credential information by intercepting SLMP communication messages, and read or write the device values of the product and stop the operations of programs by using the obtained credential information.
AI-Powered Analysis
Technical Analysis
CVE-2025-7731 is a high-severity vulnerability affecting all versions of the Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES CPU modules. The core issue is the cleartext transmission of sensitive information over the SLMP (Seamless Message Protocol) communication channel. This vulnerability allows a remote, unauthenticated attacker to intercept network traffic and extract credential information without needing any prior access or user interaction. With these credentials, the attacker can read or write device values and even halt program operations on the affected PLC (Programmable Logic Controller). The vulnerability is classified under CWE-319, which pertains to the transmission of sensitive data in cleartext, making it susceptible to eavesdropping and interception. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low complexity, no privileges or user interaction required, and a significant confidentiality impact. However, integrity and availability impacts are rated as none in the CVSS vector, though the description indicates the attacker can stop program operations, which may imply some availability impact. The lack of authentication and encryption in SLMP communications is the root cause, exposing critical industrial control system components to potential espionage and manipulation. No patches or known exploits in the wild have been reported as of the publication date, but the vulnerability poses a serious risk to industrial environments relying on these PLCs for automation and control.
Potential Impact
For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors using Mitsubishi Electric's MELSEC iQ-F Series PLCs, this vulnerability presents a significant risk. Attackers could intercept network traffic within industrial control system (ICS) environments to steal credentials, leading to unauthorized access and manipulation of control processes. This could cause operational disruptions, production downtime, and safety hazards. The ability to stop program operations remotely could lead to denial of service conditions in critical industrial processes. Additionally, the exposure of credentials could facilitate further lateral movement within ICS networks or combined IT/OT environments, increasing the attack surface. Given the increasing integration of ICS with corporate networks in Europe, the risk of cascading effects impacting business continuity and safety is elevated. The confidentiality breach also risks intellectual property theft and competitive disadvantage. The absence of authentication requirements and the ease of exploitation further amplify the threat to European industrial operators.
Mitigation Recommendations
European organizations should implement network segmentation to isolate MELSEC iQ-F Series PLCs from general IT networks and restrict SLMP protocol traffic to trusted management stations only. Employing VPNs or secure tunnels with encryption for SLMP communications can mitigate the cleartext transmission risk. Where possible, deploying network intrusion detection systems (NIDS) with signatures or anomaly detection for SLMP traffic can help identify suspicious interception attempts. Organizations should conduct thorough network traffic audits to detect unencrypted SLMP messages and unauthorized access attempts. Since no patches are currently available, Mitsubishi Electric customers should engage with the vendor for firmware updates or security advisories. Additionally, enforcing strict physical security controls around ICS network infrastructure and limiting access to authorized personnel reduces exposure. Implementing multi-factor authentication (MFA) for access to management interfaces, even if not natively supported by the PLC, via gateway devices or supervisory systems can add a layer of defense. Finally, regular security awareness training for ICS operators about network risks and monitoring for unusual PLC behavior is recommended.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-07-16T22:31:25.034Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b51adfad5a09ad00c81c64
Added to database: 9/1/2025, 4:02:39 AM
Last enriched: 9/1/2025, 4:17:46 AM
Last updated: 9/1/2025, 4:17:46 AM
Views: 2
Related Threats
CVE-2025-9764: SQL Injection in itsourcecode Sports Management System
MediumCVE-2025-54857: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Seiko Solutions Inc. SkyBridge BASIC MB-A130
CriticalCVE-2025-9763: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-6507: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
CriticalCVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.