Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.
References
Configurations
No configuration.
History
06 Aug 2025, 20:23
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Aug 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-06 07:15
Updated : 2025-08-06 20:23
NVD link : CVE-2025-7376
Mitre link : CVE-2025-7376
CVE.ORG link : CVE-2025-7376
JSON object : View
Products Affected
No product.
CWE
CWE-64
Windows Shortcut Following (.LNK)