๐Ÿ” CVE Alert

CVE-2025-0921

MEDIUM 6.5

Information Tampering Vulnerability in Multiple Services of GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, IoTWorX, MC Works64, GENESIS, GENESIS32, and BizViz

CVSS Score
6.5
EPSS Score
0.1%
EPSS Percentile
21th

Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric GENESIS32 all versions, Mitsubishi Electric BizViz all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS versions 11.00, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95, Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions, Mitsubishi Electric Iconics Digital Solutions BizViz all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.

CWE CWE-250
Vendor mitsubishi electric corporation
Product genesis64
Published May 15, 2025
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for mitsubishi electric corporation genesis64

Be the first to know when new medium vulnerabilities affecting mitsubishi electric corporation genesis64 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

Mitsubishi Electric Corporation / GENESIS64
versions 10.97.3 and prior
Mitsubishi Electric Corporation / ICONICS Suite
versions 10.97.3 and prior
Mitsubishi Electric Corporation / MobileHMI
versions 10.97.3 and prior
Mitsubishi Electric Corporation / Hyper Historian
versions 10.97.3 and prior
Mitsubishi Electric Corporation / AnalytiX
versions 10.97.3 and prior
Mitsubishi Electric Corporation / IoTWorX
version 10.95
Mitsubishi Electric Corporation / GENESIS32
all versions
Mitsubishi Electric Corporation / BizViz
all versions
Mitsubishi Electric Corporation / MC Works64
all versions
Mitsubishi Electric Corporation / GENESIS
version 11.00
Mitsubishi Electric Iconics Digital Solutions / GENESIS64
versions 10.97.3 and prior
Mitsubishi Electric Iconics Digital Solutions / ICONICS Suite
versions 10.97.3 and prior
Mitsubishi Electric Iconics Digital Solutions / MobileHMI
versions 10.97.3 and prior
Mitsubishi Electric Iconics Digital Solutions / Hyper Historian
versions 10.97.3 and prior
Mitsubishi Electric Iconics Digital Solutions / AnalytiX
versions 10.97.3 and prior
Mitsubishi Electric Iconics Digital Solutions / IoTWorX
version 10.95
Mitsubishi Electric Iconics Digital Solutions / GENESIS32
all versions
Mitsubishi Electric Iconics Digital Solutions / BizViz
all versions
Mitsubishi Electric Iconics Digital Solutions / GENESIS
version 11.00

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
mitsubishielectric.com: https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-002_en.pdf jvn.jp: https://jvn.jp/vu/JVNVU93838985 cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-04

Credits

Asher Davila from Palo Alto Networks Malav Vyas from Palo Alto Networks