CVE-2025-5023

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers within Wi-Fi range of Mitsubishi Electric's discontinued EcoGuideTAB photovoltaic monitors to access hardcoded credentials, potentially exposing power generation data, tampering with system information, or causing denial-of-service. Only affects specific PV-DR004J and PV-DR004JA units that were discontinued in 2015 and no longer supported since 2020.

💻 Affected Systems

Products:
  • Mitsubishi Electric EcoGuideTAB PV-DR004J
  • Mitsubishi Electric EcoGuideTAB PV-DR004JA
Versions: All versions
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Systems discontinued in 2015, support ended in 2020. Requires attacker within Wi-Fi communication range between measurement and display units.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of photovoltaic monitoring system allowing data theft, manipulation of power generation records, and permanent system disruption affecting energy management.

🟠

Likely Case

Unauthorized access to power generation data and potential disruption of monitoring functions within Wi-Fi range.

🟢

If Mitigated

Limited impact if systems are isolated from networks and physical access is controlled.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires CVE-2025-5022 to obtain hardcoded credentials first. Attack limited to Wi-Fi communication range.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-007_en.pdf

Restart Required: No

Instructions:

No official patch available. Products discontinued in 2015 with support ended in 2020.

🔧 Temporary Workarounds

Network Isolation

all

Physically isolate affected systems from any network connectivity and restrict Wi-Fi access.

Physical Access Control

all

Restrict physical access to devices and monitor Wi-Fi communication range.

🧯 If You Can't Patch

  • Decommission and replace affected systems with supported alternatives
  • Implement strict physical security controls around device locations

🔍 How to Verify

Check if Vulnerable:

Check device model number (PV-DR004J or PV-DR004JA) and manufacturing date (pre-2015).

Check Version:

Check physical device label for model number PV-DR004J or PV-DR004JA.

Verify Fix Applied:

No fix available to verify. Only mitigation through decommissioning or isolation.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to monitoring interface
  • Unusual Wi-Fi connection patterns

Network Indicators:

  • Unexpected Wi-Fi traffic between monitoring units
  • Authentication attempts using default credentials

SIEM Query:

Search for authentication events from PV-DR004J/PV-DR004JA devices or Wi-Fi connection attempts to monitoring interfaces.

🔗 References

📤 Share & Export