CVE-2025-3755

9.1 CRITICAL

📋 TL;DR

A critical vulnerability in Mitsubishi Electric MELSEC iQ-F Series CPU modules allows remote unauthenticated attackers to read sensitive information, disrupt MELSOFT connections, or completely stop CPU module operation by sending specially crafted packets. This affects industrial control systems using these programmable logic controllers, requiring physical reset for recovery.

💻 Affected Systems

Products:
  • Mitsubishi Electric MELSEC iQ-F Series CPU modules
Versions: All versions prior to the firmware update
Operating Systems: Embedded firmware on PLC hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects MELSOFT connection functionality and requires physical reset of CPU module for recovery after exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete shutdown of industrial processes, production stoppage, safety system disruption, and potential physical damage requiring factory reset and manual recovery.

🟠

Likely Case

Temporary denial of service affecting production lines or industrial processes, requiring manual intervention and reset to restore operations.

🟢

If Mitigated

Limited impact if network segmentation prevents direct access, but still vulnerable to internal threats or compromised network segments.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation possible if devices are exposed to internet or untrusted networks.
🏢 Internal Only: HIGH - Even internally, unauthenticated attackers on the same network can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote unauthenticated exploitation with specially crafted packets makes this highly attractive for attackers targeting industrial systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware update as specified in vendor advisory

Vendor Advisory: https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-003_en.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Mitsubishi Electric support portal. 2. Backup current configuration and programs. 3. Apply firmware update following vendor instructions. 4. Verify update completion and restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MELSEC iQ-F Series devices in separate VLANs with strict firewall rules

Access Control Lists

all

Implement network ACLs to restrict access to only trusted IP addresses and required ports

🧯 If You Can't Patch

  • Implement strict network segmentation and zero-trust architecture around affected devices
  • Deploy industrial IDS/IPS with signatures for MELSEC protocol anomalies

🔍 How to Verify

Check if Vulnerable:

Check firmware version on MELSEC iQ-F Series CPU modules against vendor advisory

Check Version:

Use MELSOFT engineering software to read CPU module firmware version

Verify Fix Applied:

Verify firmware version has been updated to patched version and test MELSOFT connectivity

📡 Detection & Monitoring

Log Indicators:

  • Unusual MELSOFT connection attempts
  • CPU module stop/reset events
  • Multiple failed connection attempts from single source

Network Indicators:

  • Malformed packets to MELSEC protocol ports (typically 5006/UDP, 5007/TCP)
  • Unusual traffic patterns to PLC network segments

SIEM Query:

source_ip=* AND (dest_port=5006 OR dest_port=5007) AND packet_size>normal_range

🔗 References

📤 Share & Export