CVE-2025-3511

7.5 HIGH

📋 TL;DR

A remote unauthenticated attacker can send specially crafted UDP packets to cause a Denial of Service condition in affected Mitsubishi Electric industrial control system modules. This vulnerability affects multiple CC-Link IE TSN and Ethernet modules used in industrial automation environments. Organizations using these products in critical infrastructure or manufacturing operations are at risk.

💻 Affected Systems

Products:
  • CC-Link IE TSN Remote I/O module
  • CC-Link IE TSN Analog-Digital Converter module
  • CC-Link IE TSN Digital-Analog Converter module
  • CC-Link IE TSN FPGA module
  • CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY
  • MELSEC iQ-R Series CC-Link IE TSN Master/Local Module
  • MELSEC iQ-R Series Ethernet Interface Module
  • CC-Link IE TSN Master/Local Station Communication LSI CP610
  • MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module
  • MELSEC iQ-F Series FX5 Ethernet Module
  • MELSEC iQ-F Series FX5-ENET/IP Ethernet Module
Versions: All versions prior to firmware updates specified in vendor advisory
Operating Systems: Embedded firmware on industrial control modules
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations of these industrial control modules. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of industrial processes, production downtime, safety system impairment, and potential physical damage if control systems become unresponsive.

🟠

Likely Case

Temporary loss of communication with affected modules causing production interruptions, requiring manual intervention and system restarts.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, allowing quick detection and isolation of affected systems.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation via UDP packets makes internet-facing systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated UDP exploitation allows attackers with network access to disrupt critical industrial systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted UDP packets to vulnerable systems. No authentication required. Technical details are available in public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Mitsubishi Electric advisory 2025-001 for specific firmware versions

Vendor Advisory: https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf

Restart Required: Yes

Instructions:

1. Review Mitsubishi Electric advisory 2025-001. 2. Identify affected modules in your environment. 3. Download appropriate firmware updates from Mitsubishi Electric support portal. 4. Apply firmware updates following vendor instructions. 5. Restart affected modules. 6. Verify functionality post-update.

🔧 Temporary Workarounds

Network Segmentation and Firewall Rules

all

Restrict UDP traffic to affected modules using network segmentation and firewall rules

# Example firewall rule to block UDP traffic to vulnerable ports
# iptables -A INPUT -p udp --dport [PORT_RANGE] -j DROP
# Replace [PORT_RANGE] with actual ports used by affected modules

VLAN Isolation

all

Place affected industrial control systems on isolated VLANs with strict access controls

# Configure VLAN isolation on network switches
# Example: switchport access vlan [VLAN_ID]
# Example: switchport mode access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy intrusion detection systems to monitor for UDP-based attack patterns and anomalous traffic

🔍 How to Verify

Check if Vulnerable:

Check module firmware versions against Mitsubishi Electric advisory 2025-001. Systems running versions prior to patched releases are vulnerable.

Check Version:

Use Mitsubishi Electric engineering tools (GX Works3, MELSOFT) to check module firmware versions. Command varies by specific module type.

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory. Test module functionality under normal operating conditions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected module restarts
  • Communication errors in industrial control system logs
  • Increased UDP traffic to industrial control modules

Network Indicators:

  • Unusual UDP packet patterns to industrial control ports
  • High volume of malformed UDP packets
  • Traffic from unexpected sources to industrial control systems

SIEM Query:

source:industrial_control AND (event_type:module_restart OR protocol:udp AND packet_size:[SUSPICIOUS_RANGE])

🔗 References

📤 Share & Export