First published: Fri Jan 21 2022(Updated: )
Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS MobileHMI | <=10.96.2 | |
Mitsubishielectric Mc Works64 | <10.95.210.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23127.
The severity of CVE-2022-23127 is medium with a CVSS score of 6.1.
Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior, and ICONICS MobileHMI versions 10.96.2 and prior are affected by CVE-2022-23127.
A remote unauthenticated attacker can exploit CVE-2022-23127 to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the obtained credentials.
Yes, you can find references for CVE-2022-23127 at the following links: [Reference 1](https://jvn.jp/vu/JVNVU95403720/index.html), [Reference 2](https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01), [Reference 3](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf).