- What is the severity of CVE-2025-3128?
- CVE-2025-3128 has been scored as a critical severity vulnerability.
- How to fix CVE-2025-3128?
- As a workaround for remediating CVE-2025-3128: Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability: * Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required. * Use within a LAN and block access from untrusted networks and hosts through firewalls. * Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic. * Allow web client access from trusted networks only. For more information, please see Mitsubishi Electric Europe MEU_PSIRT_2025-3128 https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information under the "Vulnerability Information" section.
- Is CVE-2025-3128 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2025-3128 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2025-3128?
- CVE-2025-3128 affects Mitsubishi Electric Europe smartRTU.