Mitsubishi Electric Iconics Digital Solutions Multiple Products (Update A)

MonitorCVSS 5.9ICS-CERT ICSA-25-217-01Aug 5, 2025
Mitsubishi ElectricICONICSEnergy
Attack path
Attack VectorLocal
Auth RequiredLow
ComplexityLow
User InteractionRequired
Summary

A file tampering vulnerability exists in Mitsubishi Electric ICONICS GENESIS and GENESIS64 HMI software. An attacker with local user access and GUI interaction could modify files or data on the system. MC Works64 is affected across all versions with no fix planned. GENESIS versions prior to 11.01 are vulnerable. GENESIS64 is still being assessed and a patch is in preparation.

What this means
What could happen
An attacker with local access and low-level user privileges could modify files or data on the system, potentially altering HMI displays, process parameters, or historical records without proper authorization.
Who's at risk
Energy utilities and industrial plants using Mitsubishi Electric ICONICS GENESIS or GENESIS64 HMI/SCADA software for process monitoring and control. MC Works64 users should consult their vendor as no fix is planned. This impacts organizations that rely on these systems to display and manage critical process data and setpoints.
How it could be exploited
An attacker with local user access and the ability to interact with the GUI (possibly via physical access or lateral movement from a compromised workstation) could exploit a file permission or integrity check vulnerability to modify protected files or data through the GENESIS/GENESIS64 application interface.
Prerequisites
  • Local or adjacent network access to the GENESIS/GENESIS64 workstation
  • Valid user account with low privileges on the affected system
  • Ability to interact with the GUI or access application resources
requires local accesslow attack complexityrequires user interaction with GUIintegrity impact (data tampering)GENESIS64 has no planned fix
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (3)
2 with fix1 EOL
ProductAffected VersionsFix Status
MC Works64: vers:all/*All versionsNo fix (EOL)
GENESIS64: vers:all/*All versions11.01
GENESIS: 11.0011.0011.01
Remediation & Mitigation
0/4
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

HOTFIXUpgrade GENESIS systems from version 11.00 to version 11.01 or later
HOTFIXMonitor Mitsubishi Electric Iconics Digital Solutions support communications for availability of GENESIS64 security update and apply when released
Mitigations - no patch available
0/2
MC Works64: vers:all/* has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGRestrict local access to GENESIS/GENESIS64 workstations to authorized personnel only; implement physical access controls or network segmentation if these systems are accessible from untrusted networks
HARDENINGImplement file integrity monitoring on GENESIS/GENESIS64 system directories to detect unauthorized modifications
API: /api/v1/advisories/82bb853a-b97d-4f52-b281-fbb1167f8966

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.