by utilizing a specific API route to execute arbitrary OS commands.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability: * Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required. * Use within a LAN and block access from untrusted networks and hosts through firewalls. * Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic. * Allow web client access from trusted networks only. For more information, please see Mitsubishi Electric Europe MEU_PSIRT_2025-3128 https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information under the "Vulnerability Information" section.
Wed, 24 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific API route to execute arbitrary OS commands. | |
| Title | Mitsubishi Electric Europe smartRTU Missing Authentication for Critical Function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-24T20:01:27.393Z
Reserved: 2025-04-03T16:06:31.944Z
Link: CVE-2025-3232
Updated: 2025-12-24T20:01:22.167Z
Status : Received
Published: 2025-12-24T20:15:55.233
Modified: 2025-12-24T20:15:55.233
Link: CVE-2025-3232
No data.
OpenCVE Enrichment
No data.