First published: Thu Nov 24 2022(Updated: )
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project files or execute programs illegally.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Gx Works3 | >=1.000a<=1.011m | |
Mitsubishielectric Gx Works3 | >=1.015r<=1.086q | |
Mitsubishielectric Gx Works3 | >=1.087r | |
Mitsubishi Electric 1.096A and later (affected by CVE-2022-29827, CVE-2022-29828, CVE-2022-29832, CVE-2022-29833) | ||
Mitsubishi Electric MX OPC UA Module Configurator-R: 1.08J and prior (affected by CVE-2022-25164) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Mitsubishi Electric GX Works3 vulnerability is CVE-2022-29827.
The severity of CVE-2022-29827 is high, with a severity value of 7.5.
The affected software versions for CVE-2022-29827 are GX Works3 versions from 1.000A to 1.011M and versions from 1.015R to 1.086Q, including version 1.087R and later.
CVE-2022-29827 allows a remote unauthenticated attacker to disclose sensitive information, resulting in the ability to view programs and project files or execute programs illegally.
You can find more information about CVE-2022-29827 at the following references: [1] https://jvn.jp/vu/JVNVU97244961/index.html [2] https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05 [3] https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf