{"api_version":"1","generated_at":"2026-04-14T06:20:25+00:00","cve":"CVE-2025-14816","urls":{"html":"https://cve.report/CVE-2025-14816","api":"https://cve.report/api/cve/CVE-2025-14816.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-14816","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-14816"},"summary":{"title":"Information Disclosure, Tampering, and Denial-of-Service Vulnerabilities in GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, GENESIS, and MC Works64","description":"Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials displayed in plain text in the GUI of the Hyper Historian Splitter feature by exploiting this vulnerability, when SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system.","state":"PUBLISHED","assigner":"Mitsubishi","published_at":"2026-04-08 14:16:24","updated_at":"2026-04-08 21:26:13"},"problem_types":["CWE-317","CWE-317 CWE-317 Cleartext Storage of Sensitive Information in GUI"],"metrics":[{"version":"4.0","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","score":"9.3","severity":"CRITICAL","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"CVSS","score":"9.3","severity":"CRITICAL","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","data":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"}}],"references":[{"url":"https://jvn.jp/vu/JVNVU90646130/","name":"https://jvn.jp/vu/JVNVU90646130/","refsource":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-097-01","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-097-01","refsource":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-023_en.pdf","name":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-023_en.pdf","refsource":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-14816","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14816","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"GENESIS64","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"GENESIS64","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"ICONICS Suite","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"ICONICS Suite","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"MobileHMI","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"MobileHMI","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"Hyper Historian","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"Hyper Historian","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"AnalytiX","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"AnalytiX","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"GENESIS","version":"affected versions 11.02 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"GENESIS","version":"affected versions 11.02 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"MC Works64","version":"affected all versions","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2025","cve_id":"14816","cve":"CVE-2025-14816","epss":"0.000170000","percentile":"0.039200000","score_date":"2026-04-13","updated_at":"2026-04-14 00:12:05"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-14816","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-08T16:04:20.566011Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-08T16:04:26.135Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"MobileHMI","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"MobileHMI","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"Hyper Historian","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"Hyper Historian","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"AnalytiX","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"AnalytiX","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"GENESIS","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 11.02 and prior"}]},{"defaultStatus":"unaffected","product":"GENESIS","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 11.02 and prior"}]},{"defaultStatus":"unaffected","product":"MC Works64","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"all versions"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials displayed in plain text in the GUI of the Hyper Historian Splitter feature by exploiting this vulnerability, when SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system."}],"value":"Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials displayed in plain text in the GUI of the Hyper Historian Splitter feature by exploiting this vulnerability, when SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system."}],"impacts":[{"descriptions":[{"lang":"en","value":"Information Disclosure, Tampering, and Denial-of-Service"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-317","description":"CWE-317 Cleartext Storage of Sensitive Information in GUI","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T13:23:41.344Z","orgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","shortName":"Mitsubishi"},"references":[{"tags":["vendor-advisory"],"url":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-023_en.pdf"},{"tags":["government-resource"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-097-01"},{"tags":["government-resource"],"url":"https://jvn.jp/vu/JVNVU90646130/"}],"source":{"discovery":"UNKNOWN"},"title":"Information Disclosure, Tampering, and Denial-of-Service Vulnerabilities in GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, GENESIS, and MC Works64","x_generator":{"engine":"Vulnogram 0.1.0-dev"}}},"cveMetadata":{"assignerOrgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","assignerShortName":"Mitsubishi","cveId":"CVE-2025-14816","datePublished":"2026-04-08T13:23:41.344Z","dateReserved":"2025-12-17T02:11:38.277Z","dateUpdated":"2026-04-08T16:04:26.135Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-08 14:16:24","lastModifiedDate":"2026-04-08 21:26:13","problem_types":["CWE-317","CWE-317 CWE-317 Cleartext Storage of Sensitive Information in GUI"],"metrics":{"cvssMetricV40":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"14816","Ordinal":"1","Title":"Information Disclosure, Tampering, and Denial-of-Service Vulnera","CVE":"CVE-2025-14816","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"14816","Ordinal":"1","NoteData":"Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials displayed in plain text in the GUI of the Hyper Historian Splitter feature by exploiting this vulnerability, when SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system.","Type":"Description","Title":"Information Disclosure, Tampering, and Denial-of-Service Vulnera"}]}}}