Description
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Series CC-Link IE TSN Master/Local Module, MELSEC iQ-R Series Ethernet Interface Module, CC-Link IE TSN Master/Local Station Communication LSI CP610, MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module, MELSEC iQ-F Series FX5 Ethernet Module, and MELSEC iQ-F Series FX5-ENET/IP Ethernet Module allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.
Published: 2025-04-25
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An improper validation of a specified quantity in input data allows a remote unauthenticated attacker to send specially crafted UDP packets to affected Mitsubishi Electric CC‑Link IE TSN modules, resulting in a DoS condition where the device may crash or become unresponsive. The weakness is identified as CWE-1284. The impact is limited to service availability, with no known impact on confidentiality or integrity. The vulnerability is triggered by malformed UDP packets that fail to be properly checked before use, leading to resource exhaustion or a fault in the packet handling logic.

Affected Systems

The affected products include Mitsubishi Electric Corporation CC‑Link IE TSN Remote I/O modules, CC‑Link IE TSN Analog‑Digital Converter modules, CC‑Link IE TSN Digital‑Analog Converter modules, CC‑Link IE TSN FPGA modules, CC‑Link IE TSN Remote Station Communication LSI CP620 with GbE‑PHY, CC‑Link IE TSN Master/Local Station Communication LSI CP610, and MELSEC iQ‑F Series FX5 master/local and Ethernet modules. Specific versions are not disclosed in the advisory.

Risk and Exploitability

The CVSS score of 7.5 denotes a moderate severity, while an EPSS score of less than 1 % indicates a very low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog, suggesting no documented attacks so far. The likely attack vector is a remote network attacker who can reach the device’s UDP port without authentication, sending crafted packets. Given the moderate severity and low exploitation likelihood, immediate patching is recommended, and a graceful degradation path should be considered while awaiting a vendor update.

Generated by OpenCVE AI on May 2, 2026 at 01:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the affected device firmware or firmware package to the latest release as documented in the vendor’s PSIRT advisory and ensure the device is restarted after the update.
  • Configure network perimeter devices to block or rate‑limit UDP traffic to the CC‑Link IE TSN modules while the patch is pending, thereby reducing the risk of a DoS attack.
  • Where feasible, isolate the affected modules from untrusted networks or place them behind a dedicated firewall segment to limit exposure to potential attackers.

Generated by OpenCVE AI on May 2, 2026 at 01:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12400 Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module and CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.
History

Sat, 02 May 2026 02:00:00 +0000

Type Values Removed Values Added
Title Denial of Service via Unsanitized Quantity in Mitsubishi CC‑Link IE TSN Modules

Thu, 05 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Series CC-Link IE TSN Master/Local Module, MELSEC iQ-R Series Ethernet Interface Module, and CC-Link IE TSN Master/Local Station Communication LSI CP610 allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.  A system reset of the product is required for recovery. Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Series CC-Link IE TSN Master/Local Module, MELSEC iQ-R Series Ethernet Interface Module, CC-Link IE TSN Master/Local Station Communication LSI CP610, MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module, MELSEC iQ-F Series FX5 Ethernet Module, and MELSEC iQ-F Series FX5-ENET/IP Ethernet Module allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.

Thu, 23 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 07:00:00 +0000

Type Values Removed Values Added
Description Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module and CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets. Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Series CC-Link IE TSN Master/Local Module, MELSEC iQ-R Series Ethernet Interface Module, and CC-Link IE TSN Master/Local Station Communication LSI CP610 allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.  A system reset of the product is required for recovery.
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Fri, 25 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Apr 2025 05:30:00 +0000

Type Values Removed Values Added
Description Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module and CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.
Weaknesses CWE-1284
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mitsubishi

Published:

Updated: 2026-04-24T07:13:32.562Z

Reserved: 2025-04-11T04:10:12.030Z

Link: CVE-2025-3511

cve-icon Vulnrichment

Updated: 2025-04-25T19:12:38.824Z

cve-icon NVD

Status : Deferred

Published: 2025-04-25T06:15:45.753

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3511

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T01:45:26Z

Weaknesses