CVE-2025-3128
三菱电机智能RTU设备存在CWE-78漏洞,可被远程攻击者利用执行任意OS命令,导致信息泄露、破坏或服务中断。建议使用防火墙、VPN、WAF等措施限制访问并过滤恶意流量。 2025-4-15 09:11:0 Author: claroty.com(查看原文) 阅读量:4 收藏

Critical Threat

CWE-78 Improper Neutralization of Special Elements used in an OS Command:

A remote unauthenticated attacker who has bypassed authentication could execute arbitrary OS commands to disclose, tamper with, destroy or delete information in Mitsubishi Electric smartRTU, or cause a denial-of service condition on the product.

Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability:

  • Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.
  • Use within a LAN and block access from untrusted networks and hosts through firewalls.
  • Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic.
  • Allow web client access from trusted networks only.

文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-3128
如有侵权请联系:admin#unsafe.sh