Executive Summary

A critical vulnerability, identified as CVE-2025-3699 with a CVSS v3 score of 9.8, affects a wide range of Mitsubishi Electric Air Conditioning Systems deployed worldwide within the Commercial Facilities sector. The vulnerability stems from a “Missing Authentication for Critical Function,” which could allow a remote attacker to bypass authentication entirely. Successful exploitation could lead to unauthorised control of the air conditioning system, access to sensitive stored information, and the potential for an attacker to use that information to tamper with the firmware of affected products. As of the latest advisory revision on December 23, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) has not received reports of any known public exploitation specifically targeting this vulnerability. CISA recommends that organisations perform impact analysis and risk assessments before deploying defensive measures and consult established industrial control systems (ICS) cybersecurity best practices.

Vulnerability Details

The core issue detailed in advisory ICSA-25-177-01 is a severe authentication flaw affecting numerous industrial control systems.

  • Identifier: CVE-2025-3699
  • Description: Missing Authentication for Critical Function
  • CVSS v3 Score: 9.8 (Critical)

Potential Impact

According to the CISA advisory, the consequences of a successful exploit are significant. An attacker could achieve the following:

“bypass authentication to gain unauthorised control of the air conditioning system or access sensitive information stored in the system. The attacker may also use the disclosed sensitive information to tamper with the firmware of the affected products.”

This grants an unauthorised user high-level control and access, posing a substantial risk to system integrity and operational security.

Affected Systems

The vulnerability impacts a broad portfolio of Mitsubishi Electric products used globally in commercial facilities.

  • Vendor: Mitsubishi Electric
  • Headquarters: Japan
  • Sector: Commercial Facilities
  • Deployment: Worldwide

Affected Product Models

The following 27 product versions are confirmed to be affected by CVE-2025-3699:

Product Model

G-50

G-50-W

G-50A

GB-50

GB-50A

GB-24A

G-150AD

AG-150A-A

AG-150A-J

GB-50AD

GB-50ADA-A

GB-50ADA-J

EB-50GU-A

EB-50GU-J

AE-200J

AE-200A

AE-200E

AE-50J

AE-50A

AE-50E

EW-50J

EW-50A

EW-50E

TE-200A

TE-50A

TW-50A

CMS-RMD-J

Threat & Exploitation Status

As of the last revision of the advisory, there is no evidence of active, public exploitation targeting this specific vulnerability. The advisory states:

“No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.”

CISA Recommendations & Mitigation Guidance

CISA advises organisations using the affected products to take proactive and defensive measures to minimise risk. The core recommendations include:

  • Perform Risk Assessment: Organisations should conduct a thorough impact analysis and risk assessment before deploying any defensive measures.
  • Implement Defensive Strategies: CISA recommends users implement defensive measures to reduce the risk of exploitation.
  • Follow ICS Best Practices: Organisations are encouraged to implement recommended cybersecurity strategies for the proactive defense of ICS assets. CISA provides extensive guidance on its Industrial Control Systems webpage (cisa.gov/ics). 
  • Consult CISA Resources: Two specific documents are highlighted for further guidance:
  • Report Suspicious Activity: Any suspected malicious activity should be reported to CISA for tracking and correlation with other incidents, following established internal procedures.

Advisory Metadata

  • Alert Code: ICSA-25-177-01
  • Discovery: The vulnerability was reported to Mitsubishi Electric by Mihály Csonka.
  • Last Revised: December 23, 2025

Revision History

The advisory has been updated twice since its initial publication, indicating evolving information about the vulnerability.

Date

Revision

Summary of Changes

2025-06-26

1

Initial Republication

2025-08-21

Update A

Wording changes for risk and vulnerability description.

2025-12-23

Update B

Changed affected products and mitigations.

If you need any support with your IT / OT security, please get in touch

Book a Call

We have experts here to help you