2025-12-24 19:55CVE-2025-3232icscert
PUBLISHED5.2CWE-306

Mitsubishi Electric Europe smartRTU Missing Authentication for Critical Function

A remote unauthenticated attacker may be able to bypass authentication

by utilizing a specific API route to execute arbitrary OS commands.

Problem type

Affected products

Mitsubishi Electric Europe

smartRTU

<= 3.37 - AFFECTED

References

GitHub Security Advisories

GHSA-54pw-8jmv-p9rc

A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific...

https://github.com/advisories/GHSA-54pw-8jmv-p9rc

A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific API route to execute arbitrary OS commands.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2025-3232
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2025-3232",
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "dateUpdated": "2025-12-24T20:01:27.393Z",
    "dateReserved": "2025-04-03T16:06:31.944Z",
    "datePublished": "2025-12-24T19:55:43.172Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert",
        "dateUpdated": "2025-12-24T19:55:43.172Z"
      },
      "title": "Mitsubishi Electric Europe smartRTU Missing Authentication for Critical Function",
      "descriptions": [
        {
          "lang": "en",
          "value": "A remote unauthenticated attacker may be able to bypass authentication \nby utilizing a specific API route to execute arbitrary OS commands.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "A remote unauthenticated attacker may be able to bypass authentication \nby utilizing a specific API route to execute arbitrary OS commands."
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Mitsubishi Electric Europe",
          "product": "smartRTU",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "custom",
              "lessThanOrEqual": "3.37"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-306",
              "cweId": "CWE-306",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information"
        },
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-09"
        },
        {
          "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-105-09.json"
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH"
          }
        },
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "Mitsubishi Electric Europe B.V. recommends that users take note of \nthe following mitigation measures to minimize the risk of exploiting \nthis vulnerability:\n\n\n\n  *  Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.\n\n  *  Use within a LAN and block access from untrusted networks and hosts through firewalls.\n\n  *  Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic.\n\n  *  Allow web client access from trusted networks only.\n\n\n\nFor more information, please see  Mitsubishi Electric Europe MEU_PSIRT_2025-3128 https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information  under the \"Vulnerability Information\" section.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>Mitsubishi Electric Europe B.V. recommends that users take note of \nthe following mitigation measures to minimize the risk of exploiting \nthis vulnerability:</p>\n<ul>\n<li>Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.</li>\n<li>Use within a LAN and block access from untrusted networks and hosts through firewalls.</li>\n<li>Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic.</li>\n<li>Allow web client access from trusted networks only.</li>\n</ul><p>For more information, please see <a target=\"_blank\" rel=\"nofollow\" href=\"https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information\">Mitsubishi Electric Europe MEU_PSIRT_2025-3128</a>&nbsp;under the \"Vulnerability Information\" section.\n\n<br></p>"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Noam Moshe of Claroty Team82 reported this vulnerability to CISA.",
          "type": "finder"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2025-12-24T20:01:27.393Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}