CWE
1284
EPSS
0.059%
Advisory Published
Updated

CVE-2025-3511

First published: Fri Apr 25 2025(Updated: )

Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module and CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.

Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp

Affected SoftwareAffected VersionHow to fix
Mitsubishi Electric CC-Link IE TSN Remote I/O Module
Mitsubishi Electric CC-Link IE TSN Analog-Digital Converter Module NZ2GN2B-60AD4
Mitsubishi Electric CC-Link IE TSN Digital-Analog Converter Module NZ2GN2B-60DA4
Mitsubishi Electric CC-Link IE TSN FPGA Module NZ2GN2S-D41PD02
Mitsubishi Electric CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY NZ2GACP620-300

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-3511?

    CVE-2025-3511 is classified as a high-severity vulnerability due to its potential impact on system integrity.

  • How do I fix CVE-2025-3511?

    To fix CVE-2025-3511, apply the latest firmware updates provided by Mitsubishi Electric for the affected modules.

  • What products are affected by CVE-2025-3511?

    CVE-2025-3511 affects several Mitsubishi Electric products including the CC-Link IE TSN Remote I/O module and Analog-Digital Converter module.

  • What type of vulnerability is CVE-2025-3511?

    CVE-2025-3511 is an Improper Validation of Specified Quantity in Input vulnerability.

  • What are the consequences of CVE-2025-3511 if exploited?

    Exploitation of CVE-2025-3511 could lead to unauthorized access and manipulation of system functionality.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203