CVE-2025-10314

Mitsubishi Electric · FREQSHIP-mini

Mitsubishi Electric FREQSHIP-mini for Windows contains an incorrect default permissions vulnerability, potentially allowing unauthorized local users to gain elevated system privileges.

Executive summary

Mitsubishi Electric FREQSHIP-mini for Windows is affected by an incorrect default permissions vulnerability that could allow local attackers to compromise system integrity.

Vulnerability

This vulnerability stems from incorrect default permissions within the FREQSHIP-mini software environment. A local, authenticated attacker could exploit these weak access controls to modify sensitive files or escalate privileges on the host Windows system.

Business impact

A successful exploit of this vulnerability could lead to unauthorized access to industrial communication data or the underlying operating system. Given the CVSS score of 8.8, the risk is high; an attacker with local access could disrupt industrial workflows, compromise data integrity, or facilitate further lateral movement within the corporate network, leading to significant operational downtime.

Remediation

Immediate Action: Apply the latest security updates provided by Mitsubishi Electric for FREQSHIP-mini immediately to correct the file system permissions.

Proactive Monitoring: Review Windows security logs for unauthorized permission changes or unusual account activity originating from local users.

Compensating Controls: Implement the principle of least privilege (PoLP) by restricting local interactive login access to the Windows host to only essential personnel.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The high severity rating (8.8) necessitates immediate remediation to prevent local privilege escalation. IT and OT administrators should prioritize the deployment of the vendor-supplied security patch to ensure that default permissions are hardened against unauthorized modification.