ICSA-25-128-03

Vulnerability from csaf_cisa - Published: 2025-04-25 03:00 - Updated: 2026-04-30 06:00
Summary
Mitsubishi Electric Multiple FA Products (Update C)
Notes
Risk evaluation: Successful exploitation of this vulnerability could allow a remote attacker to cause a denial-of-service (DoS) condition, a timeout error, or a communication delay by sending a specially crafted UDP packet to the product.
Critical infrastructure sectors: Critical Manufacturing
Countries/areas deployed: Worldwide
Company headquarters location: Japan
Legal Notice and Terms of Use: This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).
Advisory Conversion Disclaimer: This ICSA is a verbatim republication of Mitsubishi Electric 2025-001 from a direct conversion of the vendor's Common Security Advisory Framework (CSAF) advisory. This is republished to CISA's website as a means of increasing visibility and is provided "as-is" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Mitsubishi Electric directly for any questions regarding this advisory.
Recommended Practices: CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.
Recommended Practices: Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices: Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices: When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices: CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices: CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices: CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices: Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
CWE-1284 - Improper Validation of Specified Quantity in Input
Vendor Fix Mitsubishi Electric is releasing fixed version 10 or later for CC-Link IE TSN Remote I/O modules NZ2GN2S1-32D, NZ2GN2S1-32T, NZ2GN2S1-32TE, NZ2GN2S1-32DT, NZ2GN2S1-32DTE, NZ2GN2B1-32D, NZ2GN2B1-32T, NZ2GN2B1-32TE, NZ2GN2B1-32DT, NZ2GN2B1-32DTE, NZ2GNCF1-32D, NZ2GNCF1-32T, NZ2GNCE3-32D, NZ2GNCE3-32DT, NZ2GN12A4-16D, NZ2GN12A4-16DE, NZ2GN12A2-16T, NZ2GN12A2-16TE, NZ2GN12A42-16DT, NZ2GN12A42-16DTE, NZ2GN2S1-16D, NZ2GN2S1-16T, NZ2GN2S1-16TE, NZ2GN2B1-16D, NZ2GN2B1-16T, and NZ2GN2B1-16TE. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf." https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 08 or later for CC-Link IE TSN Analog-Digital Converter modules NZ2GN2S-60AD4 and NZ2GN2B-60AD4. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 08 or later for CC-Link IE TSN Digital-Analog Converter modules NZ2GN2S-60DA4 and NZ2GN2B-60DA4. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 02 or later for CC-Link IE TSN FPGA modules NZ2GN2S-D41P01, NZ2GN2S-D41D01, and NZ2GN2S-D41PD02. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 1.09K or later for CC-Link IE TSN Remote Station Communication LSIs CP620 with GbE-PHY NZ2GACP620-300 or NZ2GACP620-60. Please download the CP620 sample code from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 28 or later for MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-T2. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 13 or later for MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-EIP. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 07 or later for MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-SX. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 86 or later for MELSEC iQ-R Series Ethernet Interface Module RJ71EN71. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 06 or later for CC-Link IE TSN master/local Station Communication LSIs CP610 NZ2GACP610-60 and NZ2KT-NPETNG51. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 1.030 or later for MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module FX5-CCLGN-MS. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 1.210 or later for MELSEC iQ-F Series FX5 Ethernet Module FX5-ENET. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Vendor Fix Mitsubishi Electric is releasing fixed version 1.107 or later for MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP. Please download the fixed update file from the link "https://www.mitsubishielectric.com/fa/download/index.html" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf". https://www.mitsubishielectric.com/psirt/vulnerab…
Mitigation For customers of the affected products, Mitsubishi Electric recommends using a firewall, virtual private network (VPN), etc. to prevent unauthorized access when internet access is required, to minimize the risk of exploiting this vulnerability.
Mitigation For customers of the affected products, Mitsubishi Electric recommends using within a LAN and blocking access from untrusted networks and hosts through firewalls, to minimize the risk of exploiting this vulnerability.
Mitigation For customers of the affected products, Mitsubishi Electric recommends restricting physical access to the products and the LAN to which they are connected, to minimize the risk of exploiting this vulnerability.
Mitigation For customers of the affected products, Mitsubishi Electric recommends installing anti-virus software on your PC that can access the affected product, to minimize the risk of exploiting this vulnerability.
Acknowledgments
Mitsubishi Electric

{
  "document": {
    "acknowledgments": [
      {
        "organization": "Mitsubishi Electric",
        "summary": "reported this vulnerability to CISA"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "summary",
        "text": "Successful exploitation of this vulnerability could allow a remote attacker to cause a denial-of-service (DoS) condition, a timeout error, or a communication delay by sending a specially crafted UDP packet to the product. ",
        "title": "Risk evaluation"
      },
      {
        "category": "other",
        "text": "Critical Manufacturing",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Japan",
        "title": "Company headquarters location"
      },
      {
        "category": "legal_disclaimer",
        "text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
        "title": "Legal Notice and Terms of Use"
      },
      {
        "category": "other",
        "text": "This ICSA is a verbatim republication of Mitsubishi Electric 2025-001 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory.  Further, CISA does not endorse any commercial product or service.  Please contact Mitsubishi Electric directly for any questions regarding this advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-25-128-03 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-128-03.json"
      },
      {
        "category": "self",
        "summary": "Mitsubishi Electric Advisory 2025-001",
        "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-25-128-03 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-128-03"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
      }
    ],
    "title": "Mitsubishi Electric Multiple FA Products (Update C)",
    "tracking": {
      "current_release_date": "2026-04-30T06:00:00.000000Z",
      "generator": {
        "date": "2026-04-28T12:42:56.702662Z",
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.5.0"
        }
      },
      "id": "ICSA-25-128-03",
      "initial_release_date": "2025-04-25T03:00:00.000000Z",
      "revision_history": [
        {
          "date": "2025-04-25T03:00:00.000000Z",
          "legacy_version": "Initial",
          "number": "1",
          "summary": "Initial Republication"
        },
        {
          "date": "2025-10-09T06:00:00.000000Z",
          "legacy_version": "Additional Release 1",
          "number": "2",
          "summary": "CISA Republication - Update A - Update to Affected products, Impact, Countermeasures for Customers, Countermeasures for Products have been revised. The affected products RJ71GN11-T2, RJ71GN11-EIP, RJ71GN11-SX, RJ71EN71, NZ2GACP610-60 and NZ2KT-NPETNG51 have been added."
        },
        {
          "date": "2026-02-03T00:00:00.000000Z",
          "legacy_version": "Additional Release 2",
          "number": "3",
          "summary": "CISA Republication - Update B - Update to Summary, Affected products, and Remediations have been revised. The affected products FX5-CCLGN-MS, FX5-ENET, and FX5-ENET/IP have been added."
        },
        {
          "date": "2026-04-30T06:00:00.000000Z",
          "legacy_version": "Latest Updated CISA Republication",
          "number": "4",
          "summary": "CISA Republication - Update C - Added FX5-CCLGN-MS and FX5-ENET/IP that have been fixed to Countermeasures for Products. Affected products, Countermeasures for Customers, and Countermeasures for Products have been revised."
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-32D: \u003c=09",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32D"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-32T: \u003c=09",
                  "product_id": "CSAFPID-0002"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32T"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-32TE: \u003c=09",
                  "product_id": "CSAFPID-0003"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32TE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-32DT: \u003c=09",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32DT"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-32DTE: \u003c=09",
                  "product_id": "CSAFPID-0005"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-32DTE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-32D: \u003c=09",
                  "product_id": "CSAFPID-0006"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32D"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-32T: \u003c=09",
                  "product_id": "CSAFPID-0007"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32T"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-32TE: \u003c=09",
                  "product_id": "CSAFPID-0008"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32TE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-32DT: \u003c=09",
                  "product_id": "CSAFPID-0009"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32DT"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-32DTE: \u003c=09",
                  "product_id": "CSAFPID-0010"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-32DTE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GNCF1-32D: \u003c=09",
                  "product_id": "CSAFPID-0011"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GNCF1-32D"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GNCF1-32T: \u003c=09",
                  "product_id": "CSAFPID-0012"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GNCF1-32T"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GNCE3-32D: \u003c=09",
                  "product_id": "CSAFPID-0013"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GNCE3-32D"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GNCE3-32DT: \u003c=09",
                  "product_id": "CSAFPID-0014"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GNCE3-32DT"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN12A4-16D: \u003c=09",
                  "product_id": "CSAFPID-0015"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN12A4-16D"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN12A4-16DE: \u003c=09",
                  "product_id": "CSAFPID-0016"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN12A4-16DE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN12A2-16T: \u003c=09",
                  "product_id": "CSAFPID-0017"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN12A2-16T"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN12A2-16TE: \u003c=09",
                  "product_id": "CSAFPID-0018"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN12A2-16TE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN12A42-16DT: \u003c=09",
                  "product_id": "CSAFPID-0019"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN12A42-16DT"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN12A42-16DTE: \u003c=09",
                  "product_id": "CSAFPID-0020"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN12A42-16DTE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-16D: \u003c=09",
                  "product_id": "CSAFPID-0021"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-16D"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-16T: \u003c=09",
                  "product_id": "CSAFPID-0022"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-16T"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2S1-16TE: \u003c=09",
                  "product_id": "CSAFPID-0023"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2S1-16TE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-16D: \u003c=09",
                  "product_id": "CSAFPID-0024"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-16D"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-16T: \u003c=09",
                  "product_id": "CSAFPID-0025"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-16T"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=09",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote I/O module NZ2GN2B1-16TE: \u003c=09",
                  "product_id": "CSAFPID-0026"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote I/O module NZ2GN2B1-16TE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=07",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Analog-Digital Converter module NZ2GN2S-60AD4: \u003c=07",
                  "product_id": "CSAFPID-0027"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Analog-Digital Converter module NZ2GN2S-60AD4"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=07",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Analog-Digital Converter module NZ2GN2B-60AD4: \u003c=07",
                  "product_id": "CSAFPID-0028"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Analog-Digital Converter module NZ2GN2B-60AD4"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=07",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Digital-Analog Converter module NZ2GN2S-60DA4: \u003c=07",
                  "product_id": "CSAFPID-0029"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Digital-Analog Converter module NZ2GN2S-60DA4"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=07",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Digital-Analog Converter module NZ2GN2B-60DA4: \u003c=07",
                  "product_id": "CSAFPID-0030"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Digital-Analog Converter module NZ2GN2B-60DA4"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "01",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN FPGA module NZ2GN2S-D41P01: 01",
                  "product_id": "CSAFPID-0031"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN FPGA module NZ2GN2S-D41P01"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "01",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN FPGA module NZ2GN2S-D41D01: 01",
                  "product_id": "CSAFPID-0032"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN FPGA module NZ2GN2S-D41D01"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "01",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN FPGA module NZ2GN2S-D41PD02: 01",
                  "product_id": "CSAFPID-0033"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN FPGA module NZ2GN2S-D41PD02"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=1.08J",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-300: \u003c=1.08J",
                  "product_id": "CSAFPID-0034"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-300"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=1.08J",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-60: \u003c=1.08J",
                  "product_id": "CSAFPID-0035"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-60"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=26",
                "product": {
                  "name": "Mitsubishi Electric MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-T2: \u003c=26",
                  "product_id": "CSAFPID-0036"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-T2"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=10",
                "product": {
                  "name": "Mitsubishi Electric MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-EIP: \u003c=10",
                  "product_id": "CSAFPID-0037"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-EIP"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=05",
                "product": {
                  "name": "Mitsubishi Electric MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-SX: \u003c=05",
                  "product_id": "CSAFPID-0038"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-SX"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=85",
                "product": {
                  "name": "Mitsubishi Electric MELSEC iQ-R Series Ethernet Interface Module RJ71EN71: \u003c=85",
                  "product_id": "CSAFPID-0039"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-R Series Ethernet Interface Module RJ71EN71"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=05",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN master/local Station Communication LSI CP610 NZ2GACP610-60: \u003c=05",
                  "product_id": "CSAFPID-0040"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN master/local Station Communication LSI CP610 NZ2GACP610-60"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=05",
                "product": {
                  "name": "Mitsubishi Electric CC-Link IE TSN master/local Station Communication LSI CP610 NZ2KT-NPETNG51: \u003c=05",
                  "product_id": "CSAFPID-0041"
                }
              }
            ],
            "category": "product_name",
            "name": "CC-Link IE TSN master/local Station Communication LSI CP610 NZ2KT-NPETNG51"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=1.020",
                "product": {
                  "name": "Mitsubishi Electric MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module FX5-CCLGN-MS: \u003c=1.020",
                  "product_id": "CSAFPID-0042"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module FX5-CCLGN-MS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=1.200",
                "product": {
                  "name": "Mitsubishi Electric MELSEC iQ-F Series FX5 Ethernet Module FX5-ENET: \u003c=1.200",
                  "product_id": "CSAFPID-0043"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-F Series FX5 Ethernet Module FX5-ENET"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c=1.106",
                "product": {
                  "name": "Mitsubishi Electric MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP: \u003c=1.106",
                  "product_id": "CSAFPID-0044"
                }
              }
            ],
            "category": "product_name",
            "name": "MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP"
          }
        ],
        "category": "vendor",
        "name": "Mitsubishi Electric"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-3511",
      "cwe": {
        "id": "CWE-1284",
        "name": "Improper Validation of Specified Quantity in Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A denial-of-service (DoS) vulnerability due to Improper Validation of Specified Quantity in Input (CWE-1284) exists in the Ethernet function of multiple FA products. This vulnerability could allow a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted UDP packet if CC-Link IE TSN Remote I/O modules NZ2GN2S1-32D, NZ2GN2S1-32T, NZ2GN2S1-32TE, NZ2GN2S1-32DT, NZ2GN2S1-32DTE, NZ2GN2B1-32D, NZ2GN2B1-32T, NZ2GN2B1-32TE, NZ2GN2B1-32DT, NZ2GN2B1-32DTE, NZ2GNCF1-32D, NZ2GNCF1-32T, NZ2GNCE3-32D, NZ2GNCE3-32DT, NZ2GN12A4-16D, NZ2GN12A4-16DE, NZ2GN12A2-16T, NZ2GN12A2-16TE, NZ2GN12A42-16DT, NZ2GN12A42-16DTE, NZ2GN2S1-16D, NZ2GN2S1-16T, NZ2GN2S1-16TE, NZ2GN2B1-16D, NZ2GN2B1-16T, NZ2GN2B1-16TE, CC-Link IE TSN Analog-Digital Converter modules NZ2GN2S-60AD4, NZ2GN2B-60AD4, CC-Link IE TSN Digital-Analog Converter modules NZ2GN2S-60DA4 and NZ2GN2B-60DA4, CC-Link IE TSN FPGA modules NZ2GN2S-D41P01, NZ2GN2S-D41D01, NZ2GN2S-D41PD02, CC-Link IE TSN Remote Station Communication LSIs CP620 with GbE-PHY NZ2GACP620-300, and NZ2GACP620-60 does not receive a valid UDP packet within 3 seconds, in. This vulnerability could allow a remote attacker to cause a denial-of-service (DoS) condition on MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-T2, RJ71GN11-EIP, RJ71GN11-SX, MELSEC iQ-R Series Ethernet Interface Module RJ71EN71, CC-Link IE TSN master/local Station Communication LSIs CP610 NZ2GACP610-60, NZ2KT-NPETNG51, and MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module FX5-CCLGN-MS, by sending a specially crafted UDP packet. Or this vulnerability could allow a remote attacker to cause a communication delay in Simple CPU communication on MELSEC iQ-F Series FX5 Ethernet Module FX5-ENET and FX5-ENET/IP Ethernet Module FX5-ENET/IP, by sending a specially crafted UDP packet. A system reset of the product is required for recovery in all cases above. Additionally, this vulnerability could allow a remote attacker to cause a timeout error in CC-Link IEF Basic communication on MELSEC iQ-F Series FX5 Ethernet Module FX5-ENET and FX5-ENET/IP Ethernet Module FX5-ENET/IP, by sending a specially crafted UDP packet. Even if a timeout error occurs, communication will be restored once the affected product starts receiving valid UDP packets.",
          "title": "Vulnerability Summary"
        },
        {
          "category": "details",
          "text": "SSVCv2/E:N/A:Y/T:P/2026-04-23T00:00:00Z/",
          "title": "SSVC"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005",
          "CSAFPID-0006",
          "CSAFPID-0007",
          "CSAFPID-0008",
          "CSAFPID-0009",
          "CSAFPID-0010",
          "CSAFPID-0011",
          "CSAFPID-0012",
          "CSAFPID-0013",
          "CSAFPID-0014",
          "CSAFPID-0015",
          "CSAFPID-0016",
          "CSAFPID-0017",
          "CSAFPID-0018",
          "CSAFPID-0019",
          "CSAFPID-0020",
          "CSAFPID-0021",
          "CSAFPID-0022",
          "CSAFPID-0023",
          "CSAFPID-0024",
          "CSAFPID-0025",
          "CSAFPID-0026",
          "CSAFPID-0027",
          "CSAFPID-0028",
          "CSAFPID-0029",
          "CSAFPID-0030",
          "CSAFPID-0031",
          "CSAFPID-0032",
          "CSAFPID-0033",
          "CSAFPID-0034",
          "CSAFPID-0035",
          "CSAFPID-0036",
          "CSAFPID-0037",
          "CSAFPID-0038",
          "CSAFPID-0039",
          "CSAFPID-0040",
          "CSAFPID-0041",
          "CSAFPID-0042",
          "CSAFPID-0043",
          "CSAFPID-0044"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "www.cve.org",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-3511"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
        },
        {
          "category": "external",
          "summary": "cwe.mitre.org",
          "url": "https://cwe.mitre.org/data/definitions/1284.html"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 10 or later for CC-Link IE TSN Remote I/O modules NZ2GN2S1-32D, NZ2GN2S1-32T, NZ2GN2S1-32TE, NZ2GN2S1-32DT, NZ2GN2S1-32DTE, NZ2GN2B1-32D, NZ2GN2B1-32T, NZ2GN2B1-32TE, NZ2GN2B1-32DT, NZ2GN2B1-32DTE, NZ2GNCF1-32D, NZ2GNCF1-32T, NZ2GNCE3-32D, NZ2GNCE3-32DT, NZ2GN12A4-16D, NZ2GN12A4-16DE, NZ2GN12A2-16T, NZ2GN12A2-16TE, NZ2GN12A42-16DT, NZ2GN12A42-16DTE, NZ2GN2S1-16D, NZ2GN2S1-16T, NZ2GN2S1-16TE, NZ2GN2B1-16D, NZ2GN2B1-16T, and NZ2GN2B1-16TE. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf.\"",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020",
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 08 or later for CC-Link IE TSN Analog-Digital Converter modules NZ2GN2S-60AD4 and NZ2GN2B-60AD4. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0027",
            "CSAFPID-0028"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 08 or later for CC-Link IE TSN Digital-Analog Converter modules NZ2GN2S-60DA4 and NZ2GN2B-60DA4. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0029",
            "CSAFPID-0030"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 02 or later for CC-Link IE TSN FPGA modules NZ2GN2S-D41P01, NZ2GN2S-D41D01, and NZ2GN2S-D41PD02. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 1.09K or later for CC-Link IE TSN Remote Station Communication LSIs CP620 with GbE-PHY NZ2GACP620-300 or NZ2GACP620-60. Please download the CP620 sample code from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0034",
            "CSAFPID-0035"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 28 or later for MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-T2. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0036"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 13 or later for  MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-EIP. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0037"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 07 or later for MELSEC iQ-R Series CC-Link IE TSN Master/Local Module RJ71GN11-SX. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0038"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 86 or later for MELSEC iQ-R Series Ethernet Interface Module RJ71EN71. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0039"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 06 or later for CC-Link IE TSN master/local Station Communication LSIs CP610 NZ2GACP610-60 and NZ2KT-NPETNG51. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0040",
            "CSAFPID-0041"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 1.030 or later for MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module FX5-CCLGN-MS. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0042"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 1.210 or later for MELSEC iQ-F Series FX5 Ethernet Module FX5-ENET. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0043"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "vendor_fix",
          "details": "Mitsubishi Electric is releasing fixed version 1.107 or later for MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP. Please download the fixed update file from the link \"https://www.mitsubishielectric.com/fa/download/index.html\" and install it. For more information on the fixed version, refer to the Mitsubishi Electric security advisory at \"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf\".",
          "product_ids": [
            "CSAFPID-0044"
          ],
          "url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-001_en.pdf"
        },
        {
          "category": "mitigation",
          "details": "For customers of the affected products, Mitsubishi Electric recommends using a firewall, virtual private network (VPN), etc. to prevent unauthorized access when internet access is required, to minimize the risk of exploiting this vulnerability.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020",
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037",
            "CSAFPID-0038",
            "CSAFPID-0039",
            "CSAFPID-0040",
            "CSAFPID-0041",
            "CSAFPID-0042",
            "CSAFPID-0043",
            "CSAFPID-0044"
          ]
        },
        {
          "category": "mitigation",
          "details": "For customers of the affected products, Mitsubishi Electric recommends using within a LAN and blocking access from untrusted networks and hosts through firewalls, to minimize the risk of exploiting this vulnerability.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020",
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037",
            "CSAFPID-0038",
            "CSAFPID-0039",
            "CSAFPID-0040",
            "CSAFPID-0041",
            "CSAFPID-0042",
            "CSAFPID-0043",
            "CSAFPID-0044"
          ]
        },
        {
          "category": "mitigation",
          "details": "For customers of the affected products, Mitsubishi Electric recommends restricting physical access to the products and the LAN to which they are connected, to minimize the risk of exploiting this vulnerability.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020",
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037",
            "CSAFPID-0038",
            "CSAFPID-0039",
            "CSAFPID-0040",
            "CSAFPID-0041",
            "CSAFPID-0042",
            "CSAFPID-0043",
            "CSAFPID-0044"
          ]
        },
        {
          "category": "mitigation",
          "details": "For customers of the affected products, Mitsubishi Electric recommends installing anti-virus software on your PC that can access the affected product, to minimize the risk of exploiting this vulnerability.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020",
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037",
            "CSAFPID-0038",
            "CSAFPID-0039",
            "CSAFPID-0040",
            "CSAFPID-0041",
            "CSAFPID-0042",
            "CSAFPID-0043",
            "CSAFPID-0044"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005",
            "CSAFPID-0006",
            "CSAFPID-0007",
            "CSAFPID-0008",
            "CSAFPID-0009",
            "CSAFPID-0010",
            "CSAFPID-0011",
            "CSAFPID-0012",
            "CSAFPID-0013",
            "CSAFPID-0014",
            "CSAFPID-0015",
            "CSAFPID-0016",
            "CSAFPID-0017",
            "CSAFPID-0018",
            "CSAFPID-0019",
            "CSAFPID-0020",
            "CSAFPID-0021",
            "CSAFPID-0022",
            "CSAFPID-0023",
            "CSAFPID-0024",
            "CSAFPID-0025",
            "CSAFPID-0026",
            "CSAFPID-0027",
            "CSAFPID-0028",
            "CSAFPID-0029",
            "CSAFPID-0030",
            "CSAFPID-0031",
            "CSAFPID-0032",
            "CSAFPID-0033",
            "CSAFPID-0034",
            "CSAFPID-0035",
            "CSAFPID-0036",
            "CSAFPID-0037",
            "CSAFPID-0038",
            "CSAFPID-0039",
            "CSAFPID-0040",
            "CSAFPID-0041",
            "CSAFPID-0042",
            "CSAFPID-0043",
            "CSAFPID-0044"
          ]
        }
      ]
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…