A remote unauthenticated attacker may be able to bypass authentication
by utilizing a specific API route to execute arbitrary OS commands.
A remote unauthenticated attacker may be able to bypass authentication
by utilizing a specific API route to execute arbitrary OS commands.
<= 3.37 - AFFECTED
https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information
https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-09
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-105-09.json
A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific...
https://github.com/advisories/GHSA-54pw-8jmv-p9rcA remote unauthenticated attacker may be able to bypass authentication by utilizing a specific API route to execute arbitrary OS commands.
https://nvd.nist.gov/vuln/detail/CVE-2025-3232
https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-105-09.json
https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-09
https://github.com/advisories/GHSA-54pw-8jmv-p9rc
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-3232",
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"dateUpdated": "2025-12-24T20:01:27.393Z",
"dateReserved": "2025-04-03T16:06:31.944Z",
"datePublished": "2025-12-24T19:55:43.172Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert",
"dateUpdated": "2025-12-24T19:55:43.172Z"
},
"title": "Mitsubishi Electric Europe smartRTU Missing Authentication for Critical Function",
"descriptions": [
{
"lang": "en",
"value": "A remote unauthenticated attacker may be able to bypass authentication \nby utilizing a specific API route to execute arbitrary OS commands.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "A remote unauthenticated attacker may be able to bypass authentication \nby utilizing a specific API route to execute arbitrary OS commands."
}
]
}
],
"affected": [
{
"vendor": "Mitsubishi Electric Europe",
"product": "smartRTU",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThanOrEqual": "3.37"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-306",
"cweId": "CWE-306",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-09"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-105-09.json"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
}
},
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"workarounds": [
{
"lang": "en",
"value": "Mitsubishi Electric Europe B.V. recommends that users take note of \nthe following mitigation measures to minimize the risk of exploiting \nthis vulnerability:\n\n\n\n * Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.\n\n * Use within a LAN and block access from untrusted networks and hosts through firewalls.\n\n * Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic.\n\n * Allow web client access from trusted networks only.\n\n\n\nFor more information, please see Mitsubishi Electric Europe MEU_PSIRT_2025-3128 https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information under the \"Vulnerability Information\" section.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>Mitsubishi Electric Europe B.V. recommends that users take note of \nthe following mitigation measures to minimize the risk of exploiting \nthis vulnerability:</p>\n<ul>\n<li>Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.</li>\n<li>Use within a LAN and block access from untrusted networks and hosts through firewalls.</li>\n<li>Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic.</li>\n<li>Allow web client access from trusted networks only.</li>\n</ul><p>For more information, please see <a target=\"_blank\" rel=\"nofollow\" href=\"https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information\">Mitsubishi Electric Europe MEU_PSIRT_2025-3128</a> under the \"Vulnerability Information\" section.\n\n<br></p>"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Noam Moshe of Claroty Team82 reported this vulnerability to CISA.",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-24T20:01:27.393Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}