Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU

0
Medium
VulnerabilityCVE-2025-8531cvecve-2025-8531cwe-130
Published: Fri Sep 19 2025 (09/19/2025, 09:30:21 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC-Q Series Q03UDVCPU

Description

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with the first 5 digits of serial No. "24082" to "27081" allows a remote attacker to cause an integer underflow by sending specially crafted packets to the affected product to stop Ethernet communication and the execution of control programs on the product, when the user authentication function is enabled. The user authentication function is enabled by default only when settings are configured by GX Works2, which complies with the Cybersecurity Law of the People's Republic of China, and is normally disabled.

AI-Powered Analysis

AILast updated: 09/27/2025, 00:41:38 UTC

Technical Analysis

CVE-2025-8531 is a medium-severity vulnerability affecting Mitsubishi Electric Corporation's MELSEC-Q Series programmable logic controllers (PLCs), specifically models Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with serial numbers starting from "24082" to "27081". The vulnerability stems from improper handling of length parameter inconsistencies (CWE-130) in the Ethernet communication protocol of these devices. An attacker can send specially crafted packets that trigger an integer underflow condition, causing the PLC to stop Ethernet communication and halt execution of control programs. This effectively results in a denial-of-service (DoS) condition. The vulnerability requires that the user authentication function is enabled, which is not the default setting but is enabled when configured via GX Works2 software to comply with the Cybersecurity Law of the People's Republic of China. Exploitation does not require authentication or user interaction, but the attack complexity is high due to the need for crafting specific packets. The vulnerability impacts availability without compromising confidentiality or integrity. No known exploits are currently in the wild, and no patches have been released yet. The CVSS v3.1 base score is 6.8, reflecting a medium severity with network attack vector, no privileges required, no user interaction, and a scope change due to impact on the PLC's operational state.

Potential Impact

For European organizations using Mitsubishi MELSEC-Q Series PLCs in industrial control systems (ICS), this vulnerability poses a significant risk to operational continuity. The ability of an attacker to remotely disrupt Ethernet communication and halt control program execution can lead to production downtime, safety system failures, and potential cascading effects in critical infrastructure sectors such as manufacturing, energy, and transportation. Since the vulnerability affects availability only, the immediate risk is denial of service rather than data breach. However, prolonged disruption of PLC operations can cause financial losses, safety hazards, and regulatory compliance issues. The requirement for the user authentication function to be enabled limits exposure somewhat, but organizations that have enabled this feature for compliance or security hardening are at risk. Given the increasing digitization and network connectivity of ICS in Europe, this vulnerability could be leveraged by threat actors to disrupt industrial processes, especially in environments where network segmentation and monitoring are insufficient.

Mitigation Recommendations

European organizations should first identify if they operate affected Mitsubishi MELSEC-Q Series PLCs with serial numbers in the specified range. Since no patches are currently available, immediate mitigations include: 1) Disabling the user authentication function if it is not required, as the vulnerability is exploitable only when this feature is enabled. 2) Implement strict network segmentation and firewall rules to restrict access to PLC Ethernet interfaces, allowing only trusted management stations and blocking unsolicited external traffic. 3) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to Mitsubishi PLC protocols to detect and block malformed packets. 4) Monitor network traffic for unusual packet patterns indicative of exploitation attempts. 5) Coordinate with Mitsubishi Electric for timely patch releases and apply updates as soon as they become available. 6) Review and harden GX Works2 configurations to ensure compliance without unnecessarily enabling vulnerable features. 7) Conduct regular security assessments and penetration testing focused on ICS environments to identify and remediate exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2025-08-04T08:24:14.341Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cd23e474a5d0d73a2558d5

Added to database: 9/19/2025, 9:35:32 AM

Last enriched: 9/27/2025, 12:41:38 AM

Last updated: 11/1/2025, 4:39:15 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats