A remote unauthenticated attacker may be able to bypass authentication
by utilizing a specific API route to execute arbitrary OS commands.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability: * Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required. * Use within a LAN and block access from untrusted networks and hosts through firewalls. * Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic. * Allow web client access from trusted networks only. For more information, please see Mitsubishi Electric Europe MEU_PSIRT_2025-3128 https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information  under the "Vulnerability Information" section.

History

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 20:00:00 +0000

Type Values Removed Values Added
Description A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific API route to execute arbitrary OS commands.
Title Mitsubishi Electric Europe smartRTU Missing Authentication for Critical Function
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-24T20:01:27.393Z

Reserved: 2025-04-03T16:06:31.944Z

Link: CVE-2025-3232

cve-icon Vulnrichment

Updated: 2025-12-24T20:01:22.167Z

cve-icon NVD

Status : Received

Published: 2025-12-24T20:15:55.233

Modified: 2025-12-24T20:15:55.233

Link: CVE-2025-3232

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses