We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7376

Information Tampering Vulnerability in multiple processes of GENESIS64, MC Works64, and GENESIS



Description

Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.

Reserved 2025-07-09 | Published 2025-08-06 | Updated 2025-08-06 | Assigner Mitsubishi


MEDIUM: 5.9CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

Problem types

CWE-64 Windows Shortcut Following (.LNK)

Product status

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Default status
unaffected

version 11.00
affected

Default status
unaffected

version 11.00
affected

References

jvn.jp/vu/JVNVU96364629 government-resource

www.mitsubishielectric.com/...nerability/pdf/2025-009_en.pdf vendor-advisory

www.cisa.gov/news-events/ics-advisories/icsa-25-217-01 government-resource

cve.org (CVE-2025-7376)

nvd.nist.gov (CVE-2025-7376)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7376

Support options

Helpdesk Chat, Email, Knowledgebase