{"api_version":"1","generated_at":"2026-04-14T06:19:09+00:00","cve":"CVE-2025-7376","urls":{"html":"https://cve.report/CVE-2025-7376","api":"https://cve.report/api/cve/CVE-2025-7376.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-7376","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-7376"},"summary":{"title":"Information Tampering Vulnerability in Multiple Processes of GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, IoTWorX, MC Works64, and GENESIS","description":"Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95, and Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.","state":"PUBLISHED","assigner":"Mitsubishi","published_at":"2025-08-06 07:15:34","updated_at":"2026-04-09 06:16:22"},"problem_types":["CWE-64","CWE-64 CWE-64 Windows Shortcut Following (.LNK)"],"metrics":[{"version":"3.1","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-217-01","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-217-01","refsource":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://jvn.jp/vu/JVNVU96364629","name":"https://jvn.jp/vu/JVNVU96364629","refsource":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-009_en.pdf","name":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-009_en.pdf","refsource":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-7376","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-7376","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"GENESIS64","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"GENESIS64","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"ICONICS Suite","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"ICONICS Suite","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"MobileHMI","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"MobileHMI","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"Hyper Historian","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"Hyper Historian","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"AnalytiX","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"AnalytiX","version":"affected versions 10.97.3 and prior","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"IoTWorX","version":"affected version 10.95","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"IoTWorX","version":"affected version 10.95","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"MC Works64","version":"affected all versions","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Corporation","product":"GENESIS","version":"affected version 11.00","platforms":[]},{"source":"CNA","vendor":"Mitsubishi Electric Iconics Digital Solutions","product":"GENESIS","version":"affected version 11.00","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2025","cve_id":"7376","cve":"CVE-2025-7376","epss":"0.000140000","percentile":"0.026280000","score_date":"2026-04-13","updated_at":"2026-04-14 00:12:05"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-7376","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-08-07T14:11:34.071248Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-08-07T14:11:44.397Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"MobileHMI","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"MobileHMI","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"Hyper Historian","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"Hyper Historian","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"AnalytiX","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"AnalytiX","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"versions 10.97.3 and prior"}]},{"defaultStatus":"unaffected","product":"IoTWorX","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"version 10.95"}]},{"defaultStatus":"unaffected","product":"IoTWorX","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"version 10.95"}]},{"defaultStatus":"unaffected","product":"MC Works64","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"GENESIS","vendor":"Mitsubishi Electric Corporation","versions":[{"status":"affected","version":"version 11.00"}]},{"defaultStatus":"unaffected","product":"GENESIS","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"version 11.00"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95, and Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC."}],"value":"Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95, and Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC."}],"impacts":[{"descriptions":[{"lang":"en","value":"Information Tampering"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-64","description":"CWE-64 Windows Shortcut Following (.LNK)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T05:10:54.864Z","orgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","shortName":"Mitsubishi"},"references":[{"tags":["government-resource"],"url":"https://jvn.jp/vu/JVNVU96364629"},{"tags":["vendor-advisory"],"url":"https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-009_en.pdf"},{"tags":["government-resource"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-217-01"}],"source":{"discovery":"UNKNOWN"},"title":"Information Tampering Vulnerability in Multiple Processes of GENESIS64, ICONICS Suite, MobileHMI, Hyper Historian, AnalytiX, IoTWorX, MC Works64, and GENESIS","x_generator":{"engine":"Vulnogram 0.2.0"}}},"cveMetadata":{"assignerOrgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","assignerShortName":"Mitsubishi","cveId":"CVE-2025-7376","datePublished":"2025-08-06T06:28:41.185Z","dateReserved":"2025-07-09T02:02:37.759Z","dateUpdated":"2026-04-09T05:10:54.864Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-08-06 07:15:34","lastModifiedDate":"2026-04-09 06:16:22","problem_types":["CWE-64","CWE-64 CWE-64 Windows Shortcut Following (.LNK)"],"metrics":{"cvssMetricV31":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.5,"impactScore":4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"7376","Ordinal":"1","Title":"Information Tampering Vulnerability in Multiple Processes of GEN","CVE":"CVE-2025-7376","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"7376","Ordinal":"1","NoteData":"Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric IoTWorX version 10.95, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions IoTWorX version 10.95, and Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.","Type":"Description","Title":"Information Tampering Vulnerability in Multiple Processes of GEN"}]}}}