SCADA Vulnerability Causes Denial-of-Service, Impacting Industrial System Availability

Views: 56 views

65/69 Tuesday, February 3, 2026

A security vulnerability has been identified in Mitsubishi Electric Iconics Suite, a widely used Supervisory Control and Data Acquisition (SCADA) software platform deployed across industrial sectors such as energy, automotive, and manufacturing. The vulnerability, tracked as CVE-2025-0921, is rated medium severity (CVSS 6.5) and can be exploited to trigger a Denial-of-Service (DoS) condition, rendering affected systems unavailable. The issue impacts Iconics Suite versions 10.97.2 and earlier running on Microsoft Windows.

Technical analysis indicates that the flaw stems from improper handling of high-privilege system files within the AlarmWorX64 MMX Pager Agent component. A non-administrator local user can modify the SMSLogFile path via the IcoSetup64.ini configuration file and abuse symbolic links to redirect log writes to critical system files, such as the cng.sys driver. When logging occurs, the system overwrites the targeted file, corrupting it.

After a system reboot, Windows fails to load the corrupted driver, resulting in a boot failure and repeated repair loops. This effectively causes a Denial-of-Service condition affecting the industrial control system’s availability. Mitsubishi Electric has issued a security advisory recommending that organizations promptly apply mitigation measures, tighten access permissions, and install the relevant patches to ensure continuity and availability of industrial operations.

Source https://gbhackers.com/scada-flaw-enables-dos-condition/