PatchSiren cyber security CVE debrief
CVE-2025-3699 Mitsubishi Electric CVE debrief
CVE-2025-3699 is a critical authentication bypass affecting Mitsubishi Electric air conditioning control systems. According to the CISA CSAF advisory, an attacker may bypass authentication to gain unauthorized control or access sensitive information stored in the system, and that information may be used to tamper with firmware. CISA published the advisory on 2025-06-26, later issued Update A on 2025-08-21, and Update B on 2025-12-23, which changed affected products and mitigations.
- Vendor
- Mitsubishi Electric
- Product
- G-50
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-06-26
- Original CVE updated
- 2025-12-23
- Advisory published
- 2025-06-26
- Advisory updated
- 2025-12-23
Who should care
OT/ICS operators, building automation teams, facilities engineering, and security administrators responsible for Mitsubishi Electric air conditioning control systems should treat this as high priority. Organizations exposing these controllers to untrusted networks, using them through shared computers, or lacking physical access controls are especially relevant.
Technical summary
The advisory describes an authentication bypass with network-exploitable characteristics (CVSS 3.1 vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The impact is broad: unauthorized control, sensitive-information exposure, and potential downstream firmware tampering. The affected product set in Update B includes 27 Mitsubishi Electric models/families, with vendor fix versions explicitly listed for AE-200/AE-50, EW-50, TE-200/TE-50, and TW-50 variants at Ver. 8.03 or later. For the remaining affected products in the corpus, CISA lists mitigations and access-restriction guidance rather than a specific firmware version fix.
Defensive priority
Critical priority. Because the issue enables authentication bypass and can lead to control, data exposure, and firmware integrity risk, it should be handled as an urgent OT remediation item.
Recommended defensive actions
- Review the CISA CSAF advisory and Mitsubishi Electric security bulletin for the exact affected product/version mapping and verification steps.
- Apply vendor fixes where available: AE-200J/A/E, AE-50J/A/E, EW-50J/A/E, TE-200A, TE-50A, and TW-50A should be updated to Ver. 8.03 or later.
- For affected systems without a listed firmware fix in the advisory corpus, implement the vendor and CISA mitigations immediately.
- Restrict access to air conditioning systems from untrusted networks and hosts.
- Restrict physical access to the controllers, the computers that can reach them, and the connected network.
- Ensure computers used to access these systems are protected with up-to-date antivirus, operating system, and web browser software.
- Enable access restriction settings where supported, following section 6-3-3 of the Instruction Book – Initial Settings.
- Inventory exposed controllers and confirm whether any affected models are reachable from enterprise or remote-access networks; reduce exposure before applying updates or mitigations.
Evidence notes
This debrief is based only on the supplied CISA CSAF advisory (ICSA-25-177-01) and the official links included in the corpus. The source states that Update B (2025-12-23) changed affected products and mitigations. The advisory lists 27 affected product names and remediation guidance, including model-specific vendor fixes for a subset of products and general access-restriction mitigations for all affected products. No KEV entry or ransomware-campaign flag is present in the supplied data.
Official resources
-
CVE-2025-3699 CVE record
CVE.org
-
CVE-2025-3699 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Initial public disclosure: 2025-06-26. Advisory updates recorded in the source corpus: Update A on 2025-08-21 (wording changes) and Update B on 2025-12-23 (changed affected products and mitigations).