Critical Vulnerability in Mitsubishi Electric AC Systems Allows Remote Control

Mitsubishi Electric has revealed a serious authentication bypass vulnerability affecting 27 models of its air conditioning systems, potentially enabling remote attackers to gain unauthorized control over HVAC systems. Tracked as CVE-2025-3699, this vulnerability has a maximum CVSS score of 9.8, indicating its severity.


The flaw arises from a “Missing Authentication for Critical Function” weakness, allowing attackers to bypass authentication entirely. Once exploited, malicious actors can control air conditioning systems, access sensitive data, and tamper with firmware without any user interaction, making it particularly dangerous.
Discovered by security researcher Mihály Csonka, this vulnerability impacts a wide range of Mitsubishi Electric models, including the G-50, GB-50, AE-200, and EW-50 series, among others. All affected systems running firmware versions 3.37 and earlier (for G-series), 9.12 and earlier (for GB-24A), and others are vulnerable.


The risk is heightened in improperly configured environments where systems are directly accessible from the internet without VPN protection. In contrast, systems secured within internal networks or behind VPNs face significantly reduced risk.
Mitsubishi Electric has stated that there are no plans to release fixed firmware for most affected products, although improved versions for select models are in development. For immediate protection, the company recommends restricting network access from untrusted sources, limiting physical access to systems, and keeping antivirus software updated.
This disclosure underscores the growing security challenges in building automation and IoT infrastructure. Organizations using affected Mitsubishi Electric air conditioning systems should promptly assess their network configurations and implement recommended security measures to mitigate potential exploitation of this critical vulnerability.
- Other (43)
- Ransomware (153)
- Events and News (27)
- Features (45)
- Security (484)
- Tips (79)
- Google (28)
- Achievements (11)
- Products (35)
- Activation (7)
- Dealers (1)
- Bank Phishing (50)
- Malware Alerts (230)
- Cyber Attack (294)
- Data Backup (13)
- Data Breach (125)
- Phishing (164)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (70)
- Android Security (76)
- Knoweldgebase (38)
- Botnet (17)
- Updates (4)
- Alert (71)
- Hacking (70)
- Social Media (8)
- vulnerability (70)
- Hacker (38)
- Spyware (12)
- Windows (8)
- Microsoft (24)
- Uber (1)
- YouTube (1)
- Trojan (3)
- Website hacks (10)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (7)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (9)
- Mozilla (2)
- COVID-19 (5)
- Instagram (3)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (35)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (23)