Home

Description

Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote attacker to disconnect the connection by sending specially crafted TCP packets to cause a denial-of-service (DoS) condition on the products. There is no impact on connections other than the attacked one.

PUBLISHED Reserved 2025-09-11 | Published 2025-11-06 | Updated 2025-11-06 | Assigner Mitsubishi




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-1284 Improper Validation of Specified Quantity in Input

Product status

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Credits

Qian Zou, Ke Xu, Xuewei Feng, Qi Li, Xueying Li, and Gang Jin from Zhongguancun Laboratory at Tsinghua University finder

References

www.mitsubishielectric.com/...nerability/pdf/2025-014_en.pdf vendor-advisory

jvn.jp/vu/JVNVU92088475/ government-resource

cve.org (CVE-2025-10259)

nvd.nist.gov (CVE-2025-10259)

Download JSON