CWE
184
Advisory Published
Updated

CVE-2022-23128

First published: Fri Jan 21 2022(Updated: )

Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products.

Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp

Affected SoftwareAffected VersionHow to fix
ICONICS AnalytiX>=10.95.3<=10.97
ICONICS GENESIS64>=10.95.3<=10.97
ICONICS Hyper Historian>=10.95.3<=10.97
ICONICS MobileHMI>=10.95.3<=10.97
Mitsubishielectric Mc Works64>=10.95.201.23<=10.95.210.01
ICONICS and Mitsubishi Electric ICONICS Suite including GENESIS64, Hyper Historian, AnalytiX, and MobileHMI For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions up to and including 10.96.2 For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) All versions from 10.95.3 to 10.97 For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions from 10.90 to 10.97 For CVE-2022-23130 (Buffer Over-read CWE-126) All versions up to and including 10.97
ICONICS and Mitsubishi Electric For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions up to and including 10.96.2
ICONICS and Mitsubishi Electric All versions up to and including 10.96.2
ICONICS and Mitsubishi Electric For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) All versions from 10.95.3 to 10.97
ICONICS and Mitsubishi Electric All versions from 10.95.3 to 10.97
ICONICS and Mitsubishi Electric For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions from 10.90 to 10.97
ICONICS and Mitsubishi Electric All versions from 10.90 to 10.97
ICONICS and Mitsubishi Electric For CVE-2022-23130 (Buffer Over-read CWE-126) All versions up to and including 10.97
ICONICS and Mitsubishi Electric All versions up to and including 10.97
ICONICS and Mitsubishi Electric Mitsubishi Electric MC Works64 For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions prior to 4.04E (10.95.210.01) For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01) For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions prior to 4.04E (10.95.210.01) For CVE-2022-23130 (Buffer Over-read CWE-126) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01)
ICONICS and Mitsubishi Electric For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions prior to 4.04E (10.95.210.01)
ICONICS and Mitsubishi Electric All versions prior to 4.04E (10.95.210.01)
ICONICS and Mitsubishi Electric For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01)
ICONICS and Mitsubishi Electric MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01)
ICONICS and Mitsubishi Electric For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions prior to 4.04E (10.95.210.01)
ICONICS and Mitsubishi Electric For CVE-2022-23130 (Buffer Over-read CWE-126) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID for this issue?

    The vulnerability ID for this issue is CVE-2022-23128.

  • What is the severity of CVE-2022-23128?

    CVE-2022-23128 has a severity rating of 9.8 (critical).

  • Which software versions are affected by CVE-2022-23128?

    The affected software versions are Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97, and ICONICS MobileHMI.

  • What is the recommended action to fix CVE-2022-23128?

    To fix CVE-2022-23128, it is recommended to apply the patches or updates provided by Mitsubishi Electric and ICONICS.

  • Where can I find more information about CVE-2022-23128?

    You can find more information about CVE-2022-23128 at the following references: [https://jvn.jp/vu/JVNVU95403720/index.html](https://jvn.jp/vu/JVNVU95403720/index.html), [https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01](https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01), [https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203