7.5
CWE
798 321
Advisory Published
Updated

CVE-2022-29827

First published: Thu Nov 24 2022(Updated: )

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project files or execute programs illegally.

Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp

Affected SoftwareAffected VersionHow to fix
Mitsubishielectric Gx Works3>=1.000a<=1.011m
Mitsubishielectric Gx Works3>=1.015r<=1.086q
Mitsubishielectric Gx Works3>=1.087r
Mitsubishi Electric 1.096A and later (affected by CVE-2022-29827, CVE-2022-29828, CVE-2022-29832, CVE-2022-29833)
Mitsubishi Electric MX OPC UA Module Configurator-R: 1.08J and prior (affected by CVE-2022-25164)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID for this Mitsubishi Electric GX Works3 vulnerability?

    The vulnerability ID for this Mitsubishi Electric GX Works3 vulnerability is CVE-2022-29827.

  • What is the severity of CVE-2022-29827?

    The severity of CVE-2022-29827 is high, with a severity value of 7.5.

  • What is the affected software version range for CVE-2022-29827?

    The affected software versions for CVE-2022-29827 are GX Works3 versions from 1.000A to 1.011M and versions from 1.015R to 1.086Q, including version 1.087R and later.

  • What is the impact of CVE-2022-29827?

    CVE-2022-29827 allows a remote unauthenticated attacker to disclose sensitive information, resulting in the ability to view programs and project files or execute programs illegally.

  • Where can I find more information about CVE-2022-29827?

    You can find more information about CVE-2022-29827 at the following references: [1] https://jvn.jp/vu/JVNVU97244961/index.html [2] https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05 [3] https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203