CVE-2025-10089

7.7 HIGH

📋 TL;DR

This CVE describes an uncontrolled search path element vulnerability in Mitsubishi Electric's MILCO.S lighting control system applications. It allows a local attacker to execute malicious code by tricking the installer into loading a malicious DLL during installation. The vulnerability only affects the installation process and does not impact systems after installation is complete.

💻 Affected Systems

Products:
  • MILCO.S Setting Application
  • MILCO.S Setting Application (IR)
  • MILCO.S Easy Setting Application (IR)
  • MILCO.S Easy Switch Application (IR)
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable during installation process. Fixed versions have digital signature from 'Mitsubishi Electric Lighting'.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution with installer privileges, potentially leading to persistent malware installation or system takeover.

🟠

Likely Case

Local privilege escalation or malware installation during the installation process if an attacker can place malicious DLLs in the search path.

🟢

If Mitigated

No impact if installation is performed from official sources and proper file integrity checks are in place.

🌐 Internet-Facing: LOW - Vulnerability only affects local installation process, not running services.
🏢 Internal Only: MEDIUM - Local attackers could exploit during installation if they can place malicious DLLs in accessible locations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access and ability to place malicious DLL in installer search path. No exploitation after installation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed versions with digital signature 'Mitsubishi Electric Lighting'

Vendor Advisory: https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-015_en.pdf

Restart Required: No

Instructions:

1. Download updated installer from official Mitsubishi Electric website. 2. Verify digital signature contains 'Mitsubishi Electric Lighting'. 3. Reinstall affected applications using updated installer.

🔧 Temporary Workarounds

Restrict installer execution

windows

Only allow installation from trusted sources and by authorized personnel

Verify digital signatures

windows

Check installer properties for 'Mitsubishi Electric Lighting' digital signature before installation

🧯 If You Can't Patch

  • Only install from official Mitsubishi Electric website downloads
  • Implement strict access controls on installation directories and installer execution

🔍 How to Verify

Check if Vulnerable:

Check if installed applications lack 'Mitsubishi Electric Lighting' digital signature in properties

Check Version:

Check file properties of MILCO.S Lighting Control.exe for digital signature details

Verify Fix Applied:

Verify installer and installed executables have 'Mitsubishi Electric Lighting' digital signature

📡 Detection & Monitoring

Log Indicators:

  • Unusual installer execution from non-standard locations
  • DLL loading from unexpected directories during installation

Network Indicators:

  • No network indicators - local vulnerability only

SIEM Query:

Process creation events for MILCO.S installer from non-standard paths

🔗 References

📤 Share & Export