Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in Mitsubishi Electric Iconics Digital Solutions GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.
Metrics
Affected Vendors & Products
References
History
Fri, 16 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 15 May 2025 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in ICONICS GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in Mitsubishi Electric Iconics Digital Solutions GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. |
Thu, 15 May 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Execution with Unnecessary Privileges vulnerability in the Pager agent of multi-agent notification feature in ICONICS GENESIS64 prior to 10.97.3, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC. | |
Title | Information Tampering Vulnerability in Multi-agent Notification Feature of GENESIS64 and MC Works64 | |
Weaknesses | CWE-250 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Mitsubishi
Published: 2025-05-15T22:36:37.902Z
Updated: 2025-05-16T13:21:55.251Z
Reserved: 2025-01-31T01:50:57.976Z
Link: CVE-2025-0921

Updated: 2025-05-16T13:21:52.761Z

Status : Awaiting Analysis
Published: 2025-05-15T23:15:58.943
Modified: 2025-05-16T14:42:18.700
Link: CVE-2025-0921

No data.