Impact
The vulnerability arises from a Windows shortcut following flaw (CWE‑64) that allows a local authenticated attacker to create a symbolic link targeting a write destination used by the affected processes. By redirecting the write operation to an arbitrary file, the attacker can delete or overwrite that file. This can result in the loss of critical configuration or operational files, leading to a denial‑of‑service condition on the workstation or control system.
Affected Systems
Affected systems include Mitsubishi Electric Corporation and Mitsubishi Electric Iconics Digital Solutions products: GENESIS64 through version 10.97.3, ICONICS Suite through 10.97.3, MobileHMI through 10.97.3, Hyper Historian through 10.97.3, AnalytiX through 10.97.3, IoTWorX version 10.95, GENESIS version 11.00, and MC Works64 all versions. These same product lines are impacted under the Iconics Digital Solutions branding with identical version ranges.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation at this time. The vulnerability is not listed in CISA KEV. Exploitation requires local authenticated access, the ability to generate symbolic links, and knowledge of writable file paths used by the application. In practice, this usually limits an attacker to a privileged local user or malware executing with local rights. Because the flaw only exists in the specified Mitsubishi Electric products running on Windows, risk can be reduced by controlling local user privileges and monitoring file writes.
OpenCVE Enrichment
EUVD