Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.
History

Thu, 07 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 Aug 2025 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Mitsubishielectric
Mitsubishielectric genesis
Mitsubishielectric genesis64
Mitsubishielectric mc Works64
Vendors & Products Mitsubishielectric
Mitsubishielectric genesis
Mitsubishielectric genesis64
Mitsubishielectric mc Works64

Wed, 06 Aug 2025 07:00:00 +0000

Type Values Removed Values Added
Description Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.
Title Information Tampering Vulnerability in multiple processes of GENESIS64, MC Works64, and GENESIS
Weaknesses CWE-64
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mitsubishi

Published: 2025-08-06T06:28:41.185Z

Updated: 2025-08-07T14:11:44.397Z

Reserved: 2025-07-09T02:02:37.759Z

Link: CVE-2025-7376

cve-icon Vulnrichment

Updated: 2025-08-07T14:11:40.486Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-06T07:15:34.100

Modified: 2025-08-06T20:23:37.600

Link: CVE-2025-7376

cve-icon Redhat

No data.