First published: Fri Jan 21 2022(Updated: )
Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS and Mitsubishi Electric ICONICS Suite including GENESIS64, Hyper Historian, AnalytiX, and MobileHMI For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions up to and including 10.96.2 For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) All versions from 10.95.3 to 10.97 For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions from 10.90 to 10.97 For CVE-2022-23130 (Buffer Over-read CWE-126) All versions up to and including 10.97 | ||
ICONICS and Mitsubishi Electric For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions up to and including 10.96.2 | ||
ICONICS and Mitsubishi Electric All versions up to and including 10.96.2 | ||
ICONICS and Mitsubishi Electric For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) All versions from 10.95.3 to 10.97 | ||
ICONICS and Mitsubishi Electric All versions from 10.95.3 to 10.97 | ||
ICONICS and Mitsubishi Electric For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions from 10.90 to 10.97 | ||
ICONICS and Mitsubishi Electric All versions from 10.90 to 10.97 | ||
ICONICS and Mitsubishi Electric For CVE-2022-23130 (Buffer Over-read CWE-126) All versions up to and including 10.97 | ||
ICONICS and Mitsubishi Electric All versions up to and including 10.97 | ||
ICONICS and Mitsubishi Electric Mitsubishi Electric MC Works64 For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions prior to 4.04E (10.95.210.01) For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01) For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions prior to 4.04E (10.95.210.01) For CVE-2022-23130 (Buffer Over-read CWE-126) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01) | ||
ICONICS and Mitsubishi Electric For CVE-2022-23127 (Cross-site Scripting CWE-79) All versions prior to 4.04E (10.95.210.01) | ||
ICONICS and Mitsubishi Electric All versions prior to 4.04E (10.95.210.01) | ||
ICONICS and Mitsubishi Electric For CVE-2022-23128 (Incomplete List of Disallowed Inputs CWE-184) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01) | ||
ICONICS and Mitsubishi Electric MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01) | ||
ICONICS and Mitsubishi Electric For CVE-2022-23129 (Plaintext Storage of a Password CWE-256) All versions prior to 4.04E (10.95.210.01) | ||
ICONICS and Mitsubishi Electric For CVE-2022-23130 (Buffer Over-read CWE-126) MC Works64: Version 4.00A (v10.95.201.23) to 4.04E (v10.95.210.01) | ||
ICONICS GENESIS64 | >=10.90<=10.97 | |
Mitsubishi Electric MC Works64 | <10.95.210.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Mitsubishi Electric MC Works64 and ICONICS GENESIS64 vulnerability is CVE-2022-23129.
The title of the vulnerability in Mitsubishi Electric MC Works64 and ICONICS GENESIS64 is 'Plaintext Storage of a Password vulnerability'.
The severity of CVE-2022-23129 is medium (5.5).
Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior, and ICONICS GENESIS64 versions 10.90 to 10.97 are affected by CVE-2022-23129.
A local authenticated attacker can exploit CVE-2022-23129 to gain authentication information and access the database illegally.