CVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with the first 5 digits of serial No. "24082" to "27081" allows a remote attacker to cause an integer underflow by sending specially crafted packets to the affected product to stop Ethernet communication and the execution of control programs on the product, when the user authentication function is enabled. The user authentication function is enabled by default only when settings are configured by GX Works2, which complies with the Cybersecurity Law of the People's Republic of China, and is normally disabled.
AI Analysis
Technical Summary
CVE-2025-8531 is a medium-severity vulnerability affecting Mitsubishi Electric Corporation's MELSEC-Q Series programmable logic controllers (PLCs), specifically models Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with serial numbers starting from "24082" to "27081". The vulnerability stems from improper handling of length parameter inconsistencies (CWE-130) in the Ethernet communication protocol of these devices. An attacker can send specially crafted packets that trigger an integer underflow condition, causing the PLC to stop Ethernet communication and halt execution of control programs. This effectively results in a denial-of-service (DoS) condition. The vulnerability requires that the user authentication function is enabled, which is not the default setting but is enabled when configured via GX Works2 software to comply with the Cybersecurity Law of the People's Republic of China. Exploitation does not require authentication or user interaction, but the attack complexity is high due to the need for crafting specific packets. The vulnerability impacts availability without compromising confidentiality or integrity. No known exploits are currently in the wild, and no patches have been released yet. The CVSS v3.1 base score is 6.8, reflecting a medium severity with network attack vector, no privileges required, no user interaction, and a scope change due to impact on the PLC's operational state.
Potential Impact
For European organizations using Mitsubishi MELSEC-Q Series PLCs in industrial control systems (ICS), this vulnerability poses a significant risk to operational continuity. The ability of an attacker to remotely disrupt Ethernet communication and halt control program execution can lead to production downtime, safety system failures, and potential cascading effects in critical infrastructure sectors such as manufacturing, energy, and transportation. Since the vulnerability affects availability only, the immediate risk is denial of service rather than data breach. However, prolonged disruption of PLC operations can cause financial losses, safety hazards, and regulatory compliance issues. The requirement for the user authentication function to be enabled limits exposure somewhat, but organizations that have enabled this feature for compliance or security hardening are at risk. Given the increasing digitization and network connectivity of ICS in Europe, this vulnerability could be leveraged by threat actors to disrupt industrial processes, especially in environments where network segmentation and monitoring are insufficient.
Mitigation Recommendations
European organizations should first identify if they operate affected Mitsubishi MELSEC-Q Series PLCs with serial numbers in the specified range. Since no patches are currently available, immediate mitigations include: 1) Disabling the user authentication function if it is not required, as the vulnerability is exploitable only when this feature is enabled. 2) Implement strict network segmentation and firewall rules to restrict access to PLC Ethernet interfaces, allowing only trusted management stations and blocking unsolicited external traffic. 3) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to Mitsubishi PLC protocols to detect and block malformed packets. 4) Monitor network traffic for unusual packet patterns indicative of exploitation attempts. 5) Coordinate with Mitsubishi Electric for timely patch releases and apply updates as soon as they become available. 6) Review and harden GX Works2 configurations to ensure compliance without unnecessarily enabling vulnerable features. 7) Conduct regular security assessments and penetration testing focused on ICS environments to identify and remediate exposure.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Czech Republic, Sweden
CVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
Description
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with the first 5 digits of serial No. "24082" to "27081" allows a remote attacker to cause an integer underflow by sending specially crafted packets to the affected product to stop Ethernet communication and the execution of control programs on the product, when the user authentication function is enabled. The user authentication function is enabled by default only when settings are configured by GX Works2, which complies with the Cybersecurity Law of the People's Republic of China, and is normally disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-8531 is a medium-severity vulnerability affecting Mitsubishi Electric Corporation's MELSEC-Q Series programmable logic controllers (PLCs), specifically models Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with serial numbers starting from "24082" to "27081". The vulnerability stems from improper handling of length parameter inconsistencies (CWE-130) in the Ethernet communication protocol of these devices. An attacker can send specially crafted packets that trigger an integer underflow condition, causing the PLC to stop Ethernet communication and halt execution of control programs. This effectively results in a denial-of-service (DoS) condition. The vulnerability requires that the user authentication function is enabled, which is not the default setting but is enabled when configured via GX Works2 software to comply with the Cybersecurity Law of the People's Republic of China. Exploitation does not require authentication or user interaction, but the attack complexity is high due to the need for crafting specific packets. The vulnerability impacts availability without compromising confidentiality or integrity. No known exploits are currently in the wild, and no patches have been released yet. The CVSS v3.1 base score is 6.8, reflecting a medium severity with network attack vector, no privileges required, no user interaction, and a scope change due to impact on the PLC's operational state.
Potential Impact
For European organizations using Mitsubishi MELSEC-Q Series PLCs in industrial control systems (ICS), this vulnerability poses a significant risk to operational continuity. The ability of an attacker to remotely disrupt Ethernet communication and halt control program execution can lead to production downtime, safety system failures, and potential cascading effects in critical infrastructure sectors such as manufacturing, energy, and transportation. Since the vulnerability affects availability only, the immediate risk is denial of service rather than data breach. However, prolonged disruption of PLC operations can cause financial losses, safety hazards, and regulatory compliance issues. The requirement for the user authentication function to be enabled limits exposure somewhat, but organizations that have enabled this feature for compliance or security hardening are at risk. Given the increasing digitization and network connectivity of ICS in Europe, this vulnerability could be leveraged by threat actors to disrupt industrial processes, especially in environments where network segmentation and monitoring are insufficient.
Mitigation Recommendations
European organizations should first identify if they operate affected Mitsubishi MELSEC-Q Series PLCs with serial numbers in the specified range. Since no patches are currently available, immediate mitigations include: 1) Disabling the user authentication function if it is not required, as the vulnerability is exploitable only when this feature is enabled. 2) Implement strict network segmentation and firewall rules to restrict access to PLC Ethernet interfaces, allowing only trusted management stations and blocking unsolicited external traffic. 3) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to Mitsubishi PLC protocols to detect and block malformed packets. 4) Monitor network traffic for unusual packet patterns indicative of exploitation attempts. 5) Coordinate with Mitsubishi Electric for timely patch releases and apply updates as soon as they become available. 6) Review and harden GX Works2 configurations to ensure compliance without unnecessarily enabling vulnerable features. 7) Conduct regular security assessments and penetration testing focused on ICS environments to identify and remediate exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - Mitsubishi
 - Date Reserved
 - 2025-08-04T08:24:14.341Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 68cd23e474a5d0d73a2558d5
Added to database: 9/19/2025, 9:35:32 AM
Last enriched: 9/27/2025, 12:41:38 AM
Last updated: 11/1/2025, 4:39:15 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12367: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified
MediumCVE-2025-11928: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wipeoutmedia CSS & JavaScript Toolbox
MediumCVE-2025-11833: CWE-862 Missing Authorization in saadiqbal Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App
CriticalCVE-2025-62275: CWE-863: Incorrect Authorization in Liferay Portal
MediumCVE-2025-11922: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in j_3rk Inactive Logout
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.