{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:10:07.988","vulnerabilities":[{"cve":{"id":"CVE-2025-2399","sourceIdentifier":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published":"2026-03-10T16:44:08.217","lastModified":"2026-03-24T03:16:04.827","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric CNC M800V Series M800VW and M800VS, M80V Series M80V and M80VW, M800 Series M800W and M800S, M80 Series M80 and M80W, E80 Series E80, C80 Series C80, M700V Series M750VW, M720VW, 730VW, M720VS, M730VS, and M750VS, M70V Series M70V, E70 Series E70, and Software Tools NC Trainer2 and NC Trainer2 plus allows a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition by sending specially crafted packets to TCP port 683."},{"lang":"es","value":"Vulnerabilidad de validación incorrecta de índice, posición o desplazamiento especificados en la entrada en Mitsubishi Electric CNC Serie M800V M800VW y M800VS, Serie M80V M80V y M80VW, Serie M800 M800W y M800S, Serie M80 M80 y M80W, Serie E80 E80, Serie C80 C80, Serie M700V M750VW, M720VW, 730VW, M720VS, M730VS, y M750VS, Serie M70V M70V, Serie E70 E70, y Herramientas de software NC Trainer2 y NC Trainer2 plus permite a un atacante remoto causar una lectura fuera de límites, lo que resulta en una condición de denegación de servicio al enviar paquetes especialmente diseñados al puerto TCP 683."}],"metrics":{"cvssMetricV31":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-1285"}]}],"references":[{"url":"https://jvn.jp/vu/JVNVU95523788/","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-078-05","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2025-022_en.pdf","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"}]}}]}