Description
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials stored in plaintext within the local SQLite file by exploiting this vulnerability, when the local caching feature using SQLite is enabled and SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system.
Published: 2026-04-08
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Local disclosure of cleartext SQL credentials leading to possible data tampering and denial‑of‑service
Action: Apply Patch
AI Analysis

Impact

This vulnerability arises from storing SQL Server credentials in plain text within a local SQLite cache file used by multiple Mitsubishi Electric control system products. A local attacker with file system access can read those credentials, authenticate to the SQL Server, and then read, modify, or delete data hosted there. The information exposure can also be leveraged to cause a denial‑of‑service condition by corrupting or deleting critical configuration data. The weakness corresponds to cleartext storage of sensitive information (CWE‑312).

Affected Systems

The affected products include Mitsubishi Electric Corporation and Iconics Digital Solutions releases such as GENESIS, GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, and MC Works64. Vulnerabilities exist in versions 10.97.3 and earlier for GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, and AnalytiX; versions 11.02 and earlier for GENESIS; and all versions of MC Works64 where local SQLite caching is enabled. Any installation running these versions with SQL authentication and local caching presents the risk.

Risk and Exploitability

The CVSS score of 9.3 indicates a high‑severity flaw suitable for exploitation by a local attacker. EPSS information is unavailable, but the vulnerability is not currently listed in the CISA KEV catalog, suggesting no widespread exploitation reports yet. Exploitation requires local access to the file system where the SQLite cache resides; it can be carried out by reading the sensitive file, which is typically accessible to users with sufficient privileges. Consequently, the risk is significant for systems with exposed local storage, and the impact can cascade from credential theft to full data compromise or denial of service.

Generated by OpenCVE AI on April 8, 2026 at 15:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑provided security patch for the affected product version
  • Verify that local SQLite caching is disabled or that any cached credentials are removed
  • Ensure that the SQL Server credentials are stored securely and not in plaintext

Generated by OpenCVE AI on April 8, 2026 at 15:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Mitsubishi
Mitsubishi analytix
Mitsubishielectric
Mitsubishielectric gb
Mitsubishielectric genesis
Mitsubishielectric genesis64
Mitsubishielectric hyper Historian
Mitsubishielectric iconics Suite
Mitsubishielectric mc Works64
Mitsubishielectric milco.s
Mitsubishielectric mobilehmi
Vendors & Products Mitsubishi
Mitsubishi analytix
Mitsubishielectric
Mitsubishielectric gb
Mitsubishielectric genesis
Mitsubishielectric genesis64
Mitsubishielectric hyper Historian
Mitsubishielectric iconics Suite
Mitsubishielectric mc Works64
Mitsubishielectric milco.s
Mitsubishielectric mobilehmi

Wed, 08 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials stored in plaintext within the local SQLite file by exploiting this vulnerability, when the local caching feature using SQLite is enabled and SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system.
Title Information Disclosure, Tampering, and Denial-of-Service Vulnerabilities in GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, GENESIS, and MC Works64
Weaknesses CWE-312
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Mitsubishi Analytix
Mitsubishielectric Gb Genesis Genesis64 Hyper Historian Iconics Suite Mc Works64 Milco.s Mobilehmi
cve-icon MITRE

Status: PUBLISHED

Assigner: Mitsubishi

Published:

Updated: 2026-04-08T16:03:44.001Z

Reserved: 2025-12-17T01:59:30.824Z

Link: CVE-2025-14815

cve-icon Vulnrichment

Updated: 2026-04-08T16:03:40.996Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T14:16:24.650

Modified: 2026-04-08T21:26:13.410

Link: CVE-2025-14815

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:21:49Z

Weaknesses