Vulnerability Alert Mitsubishi Electric FREQSHIP-mini for Windows
🚨 Vulnerability Alert: Mitsubishi Electric FREQSHIP-mini for Windows
A malicious code execution vulnerability exists in Mitsubishi’s small-capacity UPS shutdown software, FREQSHIP-mini for Windows, due to incorrect default permissions. Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to, modify, delete, or destroy information stored on the system where the affected product is installed, or cause a denial-of-service condition on the affected system.
Details
- Vulnerability ID: CVE-2025-10314
- Affected Versions: Mitsubishi Electric FREQSHIP-mini for Windows versions >=8.0.0 and <=8.0.2
- CWE: CWE-276 Incorrect Default Permissions
A local attacker may be able to execute arbitrary code with system privileges by replacing service executable or DLL files in the installation directory with specially crafted files. This vulnerability is not exploitable remotely.
Impact
The affected product is deployed in critical infrastructure sectors including:
- Critical Manufacturing
- Energy
- Information Technology
- Healthcare and Public Health
- Government Services and Facilities
This vulnerability has been addressed in FREQSHIP-mini for Windows version 8.1.0 or later. Customers are advised to download and install the updated version from the Mitsubishi Electric download site: Mitsubishi Electric Download Site.
Mitigation Measures
Mitsubishi Electric recommends that customers take the following measures to minimize the risk of this vulnerability being exploited:
- Use the PCs with the affected product installed only within a LAN.
- Block remote logins from untrusted networks, hosts, and non-administrator users.
- Block unauthorized access by using a firewall or VPN.
- Allow remote login only for administrators when connecting the PCs with the affected product installed to the internet.
- Restrict physical access to the PC and its connected network.
- Do not click on links or open attachments in emails from untrusted sources.
- Install and regularly update antivirus software.
CISA notes that no known public exploitation specifically targeting this vulnerability has been reported at this time. This vulnerability was reported to Mitsubishi Electric by Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc.