Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7731: CWE-319 Cleartext Transmission of Sensitive Information in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES

0
High
VulnerabilityCVE-2025-7731cvecve-2025-7731cwe-319
Published: Mon Sep 01 2025 (09/01/2025, 03:57:49 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC iQ-F Series FX5U-32MT/ES

Description

Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to obtain credential information by intercepting SLMP communication messages, and read or write the device values of the product and stop the operations of programs by using the obtained credential information.

AI-Powered Analysis

AILast updated: 09/08/2025, 06:46:59 UTC

Technical Analysis

CVE-2025-7731 is a high-severity vulnerability affecting all versions of the Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES CPU modules. The vulnerability stems from the cleartext transmission of sensitive information over the SLMP (Seamless Message Protocol) communication channel. Specifically, credential information used for device authentication is transmitted without encryption, allowing a remote, unauthenticated attacker to intercept these messages. Once the attacker obtains the credentials, they can read or write device values and potentially halt the execution of programs running on the affected PLC (Programmable Logic Controller). This vulnerability does not require any user interaction or prior authentication, making it exploitable over the network with low complexity. The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality but no direct impact on integrity or availability per the vector. However, the ability to stop program operations implies potential indirect availability impact. The vulnerability is categorized under CWE-319, which concerns the cleartext transmission of sensitive information. No patches or exploits in the wild have been reported as of the publication date, but the risk remains significant given the critical role of these PLCs in industrial control environments. Attackers leveraging this vulnerability could gain unauthorized control over industrial processes, leading to operational disruptions or safety hazards.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. The MELSEC iQ-F Series PLCs are widely used in industrial automation across Europe. Exploitation could lead to unauthorized disclosure of credentials, enabling attackers to manipulate industrial processes remotely. This could result in production downtime, safety incidents, or damage to physical equipment. Confidentiality breaches may expose sensitive operational data, potentially affecting competitive advantage or regulatory compliance. Although no direct integrity or availability impact is indicated by the CVSS vector, the ability to stop program operations suggests potential for denial-of-service conditions or process sabotage. Given the increasing targeting of industrial control systems by cyber adversaries, European organizations operating these devices face heightened risk of espionage, sabotage, or ransomware attacks leveraging this vulnerability.

Mitigation Recommendations

1. Network Segmentation: Isolate MELSEC iQ-F Series PLCs on dedicated, secure industrial networks separated from corporate IT networks and the internet to reduce exposure to remote attackers. 2. Use of VPNs and Encrypted Channels: Implement secure communication tunnels (e.g., VPNs, IPsec) for any remote access to PLCs to prevent interception of cleartext credentials. 3. Monitoring and Intrusion Detection: Deploy network monitoring tools and anomaly detection systems tailored for industrial protocols to detect unauthorized SLMP traffic or suspicious commands. 4. Access Control: Restrict network access to PLCs using firewalls and access control lists, allowing only trusted management stations and operators. 5. Vendor Coordination: Engage with Mitsubishi Electric for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. Credential Management: Change default or factory credentials and implement strong, unique passwords for device access. 7. Incident Response Planning: Prepare response procedures for potential PLC compromise, including backup and recovery of control programs and rapid isolation of affected devices. These measures go beyond generic advice by focusing on network architecture, encrypted communications, and proactive monitoring specific to industrial control environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2025-07-16T22:31:25.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b51adfad5a09ad00c81c64

Added to database: 9/1/2025, 4:02:39 AM

Last enriched: 9/8/2025, 6:46:59 AM

Last updated: 10/16/2025, 5:39:17 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats