Impact
The vulnerability allows a local authenticated attacker to create a symbolic link from a file used as a write destination by the product services to a target file, enabling an unauthorized write to arbitrary files. This can result in deletion of essential files on the affected PC. The impact includes disruption of device operation, as the deleted file may be critical for normal function. Based on the description, it is inferred that such compromise could affect system operation, potentially leading to a denial‑of‑service condition.
Affected Systems
Affected vendor: Mitsubishi Electric Corporation and Mitsubishi Electric Iconics Digital Solutions. Products impacted include GENESIS, GENESIS32, GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, IoTWorX, MC Works64, and BizViz. Vulnerable versions are 10.97.3 and earlier for most products, 10.95 for IoTWorX, and 11.00 for certain GENESIS releases. All affected releases are covered by the vendor advisory.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while the EPSS score of <1% indicates a very low probability of exploitation in operational environments. The flaw is not listed in CISA’s KEV catalog, so no widespread exploitation has been reported yet. However, the requirement of local authenticated access is low in risk assessment for many industrial control systems, giving attackers a feasible path to create a malicious symlink. Successful exploitation can delete critical files and cause a denial‑of‑service on the affected PC.
OpenCVE Enrichment
EUVD