CVE-2025-11009
📋 TL;DR
A vulnerability in Mitsubishi Electric GT Designer3 allows local unauthenticated attackers to extract plaintext credentials from project files. This enables unauthorized operation of GOT2000 and GOT1000 series human-machine interfaces. All versions of GT Designer3 Version1 for both product lines are affected.
💻 Affected Systems
- Mitsubishi Electric GT Designer3 Version1 (GOT2000)
- Mitsubishi Electric GT Designer3 Version1 (GOT1000)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full control of industrial HMIs, potentially manipulating critical processes, causing equipment damage, or disrupting manufacturing operations.
Likely Case
Unauthorized access to HMI systems allowing configuration changes, data theft, or minor operational interference.
If Mitigated
Limited impact through network segmentation and access controls preventing local file access.
🎯 Exploit Status
Exploitation requires access to project files (.g3p/.g3w) which can be opened with any text editor to view credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-017_en.pdf
Restart Required: No
Instructions:
No official patch available. Follow vendor recommendations to store project files securely and implement access controls.
🔧 Temporary Workarounds
Secure Project File Storage
allStore GT Designer3 project files in encrypted directories with strict access controls
Network Segmentation
allIsolate engineering workstations and GOT devices from general network access
🧯 If You Can't Patch
- Implement strict file access controls on engineering workstations
- Use encrypted storage for all project files and restrict sharing
- Monitor access to project files and implement least privilege access
- Consider using alternative credential storage methods if supported
🔍 How to Verify
Check if Vulnerable:
Open any .g3p or .g3w project file with a text editor and search for plaintext credentials
Check Version:
Check GT Designer3 version in Help > About menu
Verify Fix Applied:
Verify project files no longer contain plaintext credentials after implementing workarounds
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access to project files
- Multiple failed login attempts on GOT devices
- Unusual configuration changes on HMIs
Network Indicators:
- Unexpected connections to GOT devices from unauthorized systems
- Traffic patterns indicating configuration changes
SIEM Query:
Search for file access events to .g3p or .g3w extensions from unauthorized users