CVE-2025-10314
Unknown Unknown - Not Provided
Incorrect Default Permissions in Mitsubishi FREQSHIP-mini Enables Privilege Escalation

Publication date: 2026-02-05

Last updated on: 2026-02-05

Assigner: Mitsubishi Electric Corporation

Description
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) or DLLs in the installation directory with specially crafted files. As a result, the attacker may be able to disclose, tamper with, delete, or destroy information stored on the PC where the affected product is installed, or cause a Denial of Service (DoS) condition on the affected system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-02-05
Generated
2026-05-07
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mitsubishi_electric freqship-mini From 8.0.0 (inc) to 8.0.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2025-10314 is an Incorrect Default Permissions vulnerability in Mitsubishi Electric's FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2. It allows a local attacker with limited privileges to replace service executable files (EXE) or DLLs in the installation directory with specially crafted malicious files."}, {'type': 'paragraph', 'content': 'By doing this, the attacker can execute arbitrary code with system-level privileges, which means they can run any code they want with the highest level of access on the affected PC.'}, {'type': 'paragraph', 'content': 'This vulnerability arises because the software sets incorrect file permissions during installation, enabling unauthorized file replacement.'}] [1, 2]


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can execute arbitrary code with system privileges on the affected PC.

  • They may disclose, tamper with, delete, or destroy information stored on the PC.
  • They can cause a Denial of Service (DoS) condition, making the system unavailable.

Because the attacker gains system-level access, the impact on confidentiality, integrity, and availability of data and system resources is high.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by verifying the installed version of the FREQSHIP-mini software on the affected Windows system. Users can check the version via the β€œVer.” notation on the UPS environment settings screen to determine if it falls within the vulnerable range (versions 8.0.0 to 8.0.2).'}, {'type': 'paragraph', 'content': 'Additionally, detection involves checking the permissions of the service executable files (EXE) or DLLs in the installation directory to see if they have incorrect default permissions that allow replacement by non-administrator users.'}, {'type': 'paragraph', 'content': 'Suggested commands to assist in detection on a Windows system include:'}, {'type': 'list_item', 'content': 'Check the installed version of FREQSHIP-mini via the UPS environment settings or by locating the executable and checking its properties.'}, {'type': 'list_item', 'content': 'Use PowerShell or Command Prompt to check file permissions in the installation directory, for example:'}, {'type': 'list_item', 'content': 'PowerShell: Get-Acl -Path "C:\\Path\\To\\FREQSHIP-mini\\" | Format-List'}, {'type': 'list_item', 'content': 'Command Prompt: icacls "C:\\Path\\To\\FREQSHIP-mini\\"'}, {'type': 'paragraph', 'content': 'These commands help identify if non-administrator users have write or modify permissions on the executable or DLL files, which would indicate vulnerability to exploitation.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the FREQSHIP-mini software to version 8.1.0 or later, where the vulnerability is fixed.

For systems where updating is not possible (such as Windows Vista, 7, 8, 8.1, or Windows Server 2008), the following mitigations are recommended:

  • Restrict the affected PCs to LAN use only to prevent exposure to untrusted networks.
  • Block remote logins from untrusted networks, hosts, and non-administrator users.
  • Use firewalls or VPNs to prevent unauthorized access.
  • Allow remote login only to administrators when internet connectivity is necessary.
  • Restrict physical access to the PC and its network.
  • Avoid clicking on untrusted email links or attachments.
  • Install and maintain antivirus software.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart