CVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with the first 5 digits of serial No. "24082" to "27081" allows a remote attacker to cause an integer underflow by sending specially crafted packets to the affected product to stop Ethernet communication and the execution of control programs on the product, when the user authentication function is enabled. The user authentication function is enabled by default only when settings are configured by GX Works2, which complies with the Cybersecurity Law of the People's Republic of China, and is normally disabled.
AI Analysis
Technical Summary
CVE-2025-8531 is a medium-severity vulnerability affecting specific Mitsubishi Electric Corporation MELSEC-Q Series programmable logic controllers (PLCs), specifically models Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with serial numbers whose first five digits range from "24082" to "27081". The vulnerability arises from improper handling of length parameter inconsistencies, classified under CWE-130 (Improper Handling of Length Parameter). An attacker can exploit this by sending specially crafted packets to the affected devices, causing an integer underflow. This underflow leads to the disruption of Ethernet communication and halts the execution of control programs on the PLCs. Notably, exploitation requires that the user authentication function be enabled, which is not the default setting; it is only enabled when configured via GX Works2 software to comply with the Cybersecurity Law of the People's Republic of China. The vulnerability has a CVSS v3.1 base score of 6.8, indicating a medium severity level, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact affects availability (A:H) but does not compromise confidentiality or integrity. There are currently no known exploits in the wild and no patches publicly available. The vulnerability could cause denial of service conditions by stopping Ethernet communication and control program execution, which are critical functions in industrial control systems. Given the affected devices are PLCs used in industrial automation, this vulnerability poses a risk to operational continuity in environments where these devices are deployed and user authentication is enabled.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability could lead to significant operational disruptions. The affected Mitsubishi MELSEC-Q Series PLCs are widely used in industrial automation across Europe. Exploitation could result in denial of service conditions, halting control program execution and Ethernet communications, potentially causing production downtime, safety hazards, and financial losses. Since the vulnerability requires the user authentication function to be enabled, the risk is higher in environments where compliance with cybersecurity regulations (such as those inspired by or aligned with the Chinese Cybersecurity Law) has led to enabling this feature. The disruption of PLC operations could also impact supply chains and critical infrastructure services, increasing the risk of cascading failures. Although confidentiality and integrity are not directly impacted, availability is critical in industrial control systems, making this vulnerability a serious concern. The lack of known exploits reduces immediate risk, but the potential for future exploitation remains, especially if attackers develop tailored payloads. European organizations with Mitsubishi PLCs should prioritize assessment and mitigation to avoid operational interruptions.
Mitigation Recommendations
1. Inventory and Identification: European organizations should identify if they have any affected MELSEC-Q Series PLCs with serial numbers in the specified range. 2. Authentication Settings Review: Verify whether the user authentication function is enabled on these devices. If not required, consider disabling it temporarily until a patch is available, balancing security and risk. 3. Network Segmentation: Isolate PLCs from general IT networks and restrict access to trusted management stations only, reducing exposure to remote attacks. 4. Access Controls: Implement strict firewall rules and network access controls to limit incoming traffic to PLCs, allowing only authorized sources. 5. Monitoring and Detection: Deploy network monitoring to detect anomalous packets or traffic patterns targeting PLCs, focusing on unusual Ethernet communication disruptions. 6. Vendor Coordination: Engage with Mitsubishi Electric for updates on patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Incident Response Planning: Prepare response plans for potential denial of service incidents affecting PLCs to minimize downtime. 8. Configuration Management: Avoid enabling the user authentication function unless mandated by compliance requirements, and document any changes thoroughly. 9. Security Awareness: Train operational technology (OT) personnel on this vulnerability and best practices to prevent exploitation. These measures go beyond generic advice by focusing on specific device configurations, network controls, and operational procedures relevant to the affected PLCs and the nature of the vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Czech Republic, Sweden
CVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
Description
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with the first 5 digits of serial No. "24082" to "27081" allows a remote attacker to cause an integer underflow by sending specially crafted packets to the affected product to stop Ethernet communication and the execution of control programs on the product, when the user authentication function is enabled. The user authentication function is enabled by default only when settings are configured by GX Works2, which complies with the Cybersecurity Law of the People's Republic of China, and is normally disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-8531 is a medium-severity vulnerability affecting specific Mitsubishi Electric Corporation MELSEC-Q Series programmable logic controllers (PLCs), specifically models Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with serial numbers whose first five digits range from "24082" to "27081". The vulnerability arises from improper handling of length parameter inconsistencies, classified under CWE-130 (Improper Handling of Length Parameter). An attacker can exploit this by sending specially crafted packets to the affected devices, causing an integer underflow. This underflow leads to the disruption of Ethernet communication and halts the execution of control programs on the PLCs. Notably, exploitation requires that the user authentication function be enabled, which is not the default setting; it is only enabled when configured via GX Works2 software to comply with the Cybersecurity Law of the People's Republic of China. The vulnerability has a CVSS v3.1 base score of 6.8, indicating a medium severity level, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact affects availability (A:H) but does not compromise confidentiality or integrity. There are currently no known exploits in the wild and no patches publicly available. The vulnerability could cause denial of service conditions by stopping Ethernet communication and control program execution, which are critical functions in industrial control systems. Given the affected devices are PLCs used in industrial automation, this vulnerability poses a risk to operational continuity in environments where these devices are deployed and user authentication is enabled.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability could lead to significant operational disruptions. The affected Mitsubishi MELSEC-Q Series PLCs are widely used in industrial automation across Europe. Exploitation could result in denial of service conditions, halting control program execution and Ethernet communications, potentially causing production downtime, safety hazards, and financial losses. Since the vulnerability requires the user authentication function to be enabled, the risk is higher in environments where compliance with cybersecurity regulations (such as those inspired by or aligned with the Chinese Cybersecurity Law) has led to enabling this feature. The disruption of PLC operations could also impact supply chains and critical infrastructure services, increasing the risk of cascading failures. Although confidentiality and integrity are not directly impacted, availability is critical in industrial control systems, making this vulnerability a serious concern. The lack of known exploits reduces immediate risk, but the potential for future exploitation remains, especially if attackers develop tailored payloads. European organizations with Mitsubishi PLCs should prioritize assessment and mitigation to avoid operational interruptions.
Mitigation Recommendations
1. Inventory and Identification: European organizations should identify if they have any affected MELSEC-Q Series PLCs with serial numbers in the specified range. 2. Authentication Settings Review: Verify whether the user authentication function is enabled on these devices. If not required, consider disabling it temporarily until a patch is available, balancing security and risk. 3. Network Segmentation: Isolate PLCs from general IT networks and restrict access to trusted management stations only, reducing exposure to remote attacks. 4. Access Controls: Implement strict firewall rules and network access controls to limit incoming traffic to PLCs, allowing only authorized sources. 5. Monitoring and Detection: Deploy network monitoring to detect anomalous packets or traffic patterns targeting PLCs, focusing on unusual Ethernet communication disruptions. 6. Vendor Coordination: Engage with Mitsubishi Electric for updates on patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Incident Response Planning: Prepare response plans for potential denial of service incidents affecting PLCs to minimize downtime. 8. Configuration Management: Avoid enabling the user authentication function unless mandated by compliance requirements, and document any changes thoroughly. 9. Security Awareness: Train operational technology (OT) personnel on this vulnerability and best practices to prevent exploitation. These measures go beyond generic advice by focusing on specific device configurations, network controls, and operational procedures relevant to the affected PLCs and the nature of the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2025-08-04T08:24:14.341Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cd23e474a5d0d73a2558d5
Added to database: 9/19/2025, 9:35:32 AM
Last enriched: 9/19/2025, 9:35:52 AM
Last updated: 9/19/2025, 3:30:00 PM
Views: 6
Related Threats
CVE-2025-57296: n/a
UnknownCVE-2025-56869: n/a
UnknownCVE-2025-10718: Improper Export of Android Application Components in Ooma Office Business Phone App
MediumCVE-2025-55910: n/a
MediumCVE-2025-59427: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in cloudflare workers-sdk
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.