CVE-2025-11009

5.1 MEDIUM

📋 TL;DR

A vulnerability in Mitsubishi Electric GT Designer3 allows local unauthenticated attackers to extract plaintext credentials from project files. This enables unauthorized operation of GOT2000 and GOT1000 series human-machine interfaces. All versions of GT Designer3 Version1 for both product lines are affected.

💻 Affected Systems

Products:
  • Mitsubishi Electric GT Designer3 Version1 (GOT2000)
  • Mitsubishi Electric GT Designer3 Version1 (GOT1000)
Versions: All versions
Operating Systems: Windows (design software)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the GT Designer3 software itself, not the GOT devices. Project files contain cleartext credentials.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of industrial HMIs, potentially manipulating critical processes, causing equipment damage, or disrupting manufacturing operations.

🟠

Likely Case

Unauthorized access to HMI systems allowing configuration changes, data theft, or minor operational interference.

🟢

If Mitigated

Limited impact through network segmentation and access controls preventing local file access.

🌐 Internet-Facing: LOW - Requires local access to project files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Insider threats or compromised workstations could access project files containing credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to project files (.g3p/.g3w) which can be opened with any text editor to view credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-017_en.pdf

Restart Required: No

Instructions:

No official patch available. Follow vendor recommendations to store project files securely and implement access controls.

🔧 Temporary Workarounds

Secure Project File Storage

all

Store GT Designer3 project files in encrypted directories with strict access controls

Network Segmentation

all

Isolate engineering workstations and GOT devices from general network access

🧯 If You Can't Patch

  • Implement strict file access controls on engineering workstations
  • Use encrypted storage for all project files and restrict sharing
  • Monitor access to project files and implement least privilege access
  • Consider using alternative credential storage methods if supported

🔍 How to Verify

Check if Vulnerable:

Open any .g3p or .g3w project file with a text editor and search for plaintext credentials

Check Version:

Check GT Designer3 version in Help > About menu

Verify Fix Applied:

Verify project files no longer contain plaintext credentials after implementing workarounds

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to project files
  • Multiple failed login attempts on GOT devices
  • Unusual configuration changes on HMIs

Network Indicators:

  • Unexpected connections to GOT devices from unauthorized systems
  • Traffic patterns indicating configuration changes

SIEM Query:

Search for file access events to .g3p or .g3w extensions from unauthorized users

🔗 References

📤 Share & Export