Skip to main content

CVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU

Medium
VulnerabilityCVE-2025-8531cvecve-2025-8531cwe-130
Published: Fri Sep 19 2025 (09/19/2025, 09:30:21 UTC)
Source: CVE Database V5
Vendor/Project: Mitsubishi Electric Corporation
Product: MELSEC-Q Series Q03UDVCPU

Description

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with the first 5 digits of serial No. "24082" to "27081" allows a remote attacker to cause an integer underflow by sending specially crafted packets to the affected product to stop Ethernet communication and the execution of control programs on the product, when the user authentication function is enabled. The user authentication function is enabled by default only when settings are configured by GX Works2, which complies with the Cybersecurity Law of the People's Republic of China, and is normally disabled.

AI-Powered Analysis

AILast updated: 09/19/2025, 09:35:52 UTC

Technical Analysis

CVE-2025-8531 is a medium-severity vulnerability affecting specific Mitsubishi Electric Corporation MELSEC-Q Series programmable logic controllers (PLCs), specifically models Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with serial numbers whose first five digits range from "24082" to "27081". The vulnerability arises from improper handling of length parameter inconsistencies, classified under CWE-130 (Improper Handling of Length Parameter). An attacker can exploit this by sending specially crafted packets to the affected devices, causing an integer underflow. This underflow leads to the disruption of Ethernet communication and halts the execution of control programs on the PLCs. Notably, exploitation requires that the user authentication function be enabled, which is not the default setting; it is only enabled when configured via GX Works2 software to comply with the Cybersecurity Law of the People's Republic of China. The vulnerability has a CVSS v3.1 base score of 6.8, indicating a medium severity level, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact affects availability (A:H) but does not compromise confidentiality or integrity. There are currently no known exploits in the wild and no patches publicly available. The vulnerability could cause denial of service conditions by stopping Ethernet communication and control program execution, which are critical functions in industrial control systems. Given the affected devices are PLCs used in industrial automation, this vulnerability poses a risk to operational continuity in environments where these devices are deployed and user authentication is enabled.

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability could lead to significant operational disruptions. The affected Mitsubishi MELSEC-Q Series PLCs are widely used in industrial automation across Europe. Exploitation could result in denial of service conditions, halting control program execution and Ethernet communications, potentially causing production downtime, safety hazards, and financial losses. Since the vulnerability requires the user authentication function to be enabled, the risk is higher in environments where compliance with cybersecurity regulations (such as those inspired by or aligned with the Chinese Cybersecurity Law) has led to enabling this feature. The disruption of PLC operations could also impact supply chains and critical infrastructure services, increasing the risk of cascading failures. Although confidentiality and integrity are not directly impacted, availability is critical in industrial control systems, making this vulnerability a serious concern. The lack of known exploits reduces immediate risk, but the potential for future exploitation remains, especially if attackers develop tailored payloads. European organizations with Mitsubishi PLCs should prioritize assessment and mitigation to avoid operational interruptions.

Mitigation Recommendations

1. Inventory and Identification: European organizations should identify if they have any affected MELSEC-Q Series PLCs with serial numbers in the specified range. 2. Authentication Settings Review: Verify whether the user authentication function is enabled on these devices. If not required, consider disabling it temporarily until a patch is available, balancing security and risk. 3. Network Segmentation: Isolate PLCs from general IT networks and restrict access to trusted management stations only, reducing exposure to remote attacks. 4. Access Controls: Implement strict firewall rules and network access controls to limit incoming traffic to PLCs, allowing only authorized sources. 5. Monitoring and Detection: Deploy network monitoring to detect anomalous packets or traffic patterns targeting PLCs, focusing on unusual Ethernet communication disruptions. 6. Vendor Coordination: Engage with Mitsubishi Electric for updates on patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Incident Response Planning: Prepare response plans for potential denial of service incidents affecting PLCs to minimize downtime. 8. Configuration Management: Avoid enabling the user authentication function unless mandated by compliance requirements, and document any changes thoroughly. 9. Security Awareness: Train operational technology (OT) personnel on this vulnerability and best practices to prevent exploitation. These measures go beyond generic advice by focusing on specific device configurations, network controls, and operational procedures relevant to the affected PLCs and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2025-08-04T08:24:14.341Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cd23e474a5d0d73a2558d5

Added to database: 9/19/2025, 9:35:32 AM

Last enriched: 9/19/2025, 9:35:52 AM

Last updated: 9/19/2025, 3:30:00 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats