7.5
CWE
798 321
Advisory Published
Updated

CVE-2022-29829

First published: Thu Nov 24 2022(Updated: )

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C and Motion Control Setting(GX Works3 related software) versions from 1.035M to 1.042U allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.

Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp

Affected SoftwareAffected VersionHow to fix
Mitsubishielectric Gx Works3>=1.000a<=1.011m
Mitsubishielectric Gx Works3>=1.015r<=1.086q
Mitsubishielectric Gx Works3>=1.087r
Mitsubishi Electric 1.096A and later (affected by CVE-2022-29827, CVE-2022-29828, CVE-2022-29832, CVE-2022-29833)
Mitsubishi Electric MX OPC UA Module Configurator-R: 1.08J and prior (affected by CVE-2022-25164)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-29829?

    CVE-2022-29829 is a vulnerability known as Use of Hard-coded Cryptographic Key in Mitsubishi Electric GX Works3, GT Designer3, and Motion Control Setting software. It allows remote unauthenticated attackers to exploit the system.

  • Which software versions are affected by CVE-2022-29829?

    GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C, and Motion Control Setting (GX Works3 related software) versions from 1.035M to 1.042U are affected by CVE-2022-29829.

  • What is the severity of CVE-2022-29829?

    CVE-2022-29829 has a severity score of 7.5, which is considered high.

  • How can remote unauthenticated attackers exploit CVE-2022-29829?

    Remote unauthenticated attackers can exploit CVE-2022-29829 by leveraging the hard-coded cryptographic key vulnerability in the affected Mitsubishi Electric software.

  • Are there any fixes or patches available for CVE-2022-29829?

    Yes, Mitsubishi Electric has released a security advisory with mitigation measures to address the vulnerability. Please refer to the provided references for more information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203