We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3755

Information Disclosure and Denial-of-Service(DoS) Vulnerability in MELSEC iQ-F Series CPU module



Description

Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to read information in the product, to cause a Denial-of-Service (DoS) condition in MELSOFT connection, or to stop the operation of the CPU module (causing a DoS condtion on the CPU module), by sending specially crafted packets. The product is needed to reset for recovery.

Reserved 2025-04-17 | Published 2025-05-29 | Updated 2025-05-29 | Assigner Mitsubishi


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Problem types

CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input

Product status

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

References

www.mitsubishielectric.com/...nerability/pdf/2025-003_en.pdf vendor-advisory

jvn.jp/vu/JVNVU94070048/ government-resource

cve.org (CVE-2025-3755)

nvd.nist.gov (CVE-2025-3755)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3755

Support options

Helpdesk Chat, Email, Knowledgebase