Description
Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to read information in the product, to cause a Denial-of-Service (DoS) condition in MELSOFT connection, or to stop the operation of the CPU module (causing a DoS condtion on the CPU module), by sending specially crafted packets. The product is needed to reset for recovery.
Reserved 2025-04-17 | Published 2025-05-29 | Updated 2025-05-29 | Assigner
MitsubishiCRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Problem types
CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input
Product status
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
Default status
unaffected
All versions
affected
References
www.mitsubishielectric.com/...nerability/pdf/2025-003_en.pdf vendor-advisory
jvn.jp/vu/JVNVU94070048/ government-resource
cve.org (CVE-2025-3755)
nvd.nist.gov (CVE-2025-3755)
Download JSON