Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Aug 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in Mitsubishi Electric Iconics Digital Solutions GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. | Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. |
Title | Information Tampering Vulnerability in Multi-agent Notification Feature of GENESIS64 and MC Works64 | Information Tampering Vulnerability in Multiple Services of GENESIS64, MC Works64, and GENESIS |
Thu, 29 May 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 16 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 15 May 2025 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in ICONICS GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in Mitsubishi Electric Iconics Digital Solutions GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. |
Thu, 15 May 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in ICONICS GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. | |
Title | Information Tampering Vulnerability in Multi-agent Notification Feature of GENESIS64 and MC Works64 | |
Weaknesses | CWE-250 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Mitsubishi
Published: 2025-05-15T22:36:37.902Z
Updated: 2025-08-06T06:26:05.929Z
Reserved: 2025-01-31T01:50:57.976Z
Link: CVE-2025-0921

Updated: 2025-05-16T13:21:52.761Z

Status : Awaiting Analysis
Published: 2025-05-15T23:15:58.943
Modified: 2025-08-06T07:15:32.540
Link: CVE-2025-0921

No data.