A remote unauthenticated attacker who has bypassed authentication could
execute arbitrary OS commands to disclose, tamper with, destroy or
delete information in Mitsubishi Electric smartRTU, or cause a denial-of
service condition on the product.
Fixes

Solution

No solution given by the vendor.


Workaround

Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability: * Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required. * Use within a LAN and block access from untrusted networks and hosts through firewalls. * Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic. * Allow web client access from trusted networks only. For more information, please see Mitsubishi Electric Europe MEU_PSIRT_2025-3128 https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information  under the "Vulnerability Information" section.

History

Sat, 23 Aug 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mitsubishielectric
Mitsubishielectric smartrtu
Vendors & Products Mitsubishielectric
Mitsubishielectric smartrtu

Fri, 22 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 19:45:00 +0000

Type Values Removed Values Added
Description A remote unauthenticated attacker who has bypassed authentication could execute arbitrary OS commands to disclose, tamper with, destroy or delete information in Mitsubishi Electric smartRTU, or cause a denial-of service condition on the product.
Title Mitsubishi Electric Europe smartRTU OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-08-22T15:50:28.090Z

Reserved: 2025-04-02T15:44:23.734Z

Link: CVE-2025-3128

cve-icon Vulnrichment

Updated: 2025-08-21T20:08:00.800Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-21T20:15:32.840

Modified: 2025-08-22T18:08:51.663

Link: CVE-2025-3128

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-23T11:53:20Z