First published: Thu Nov 24 2022(Updated: )
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C and Motion Control Setting(GX Works3 related software) versions from 1.035M to 1.042U allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Gx Works3 | >=1.000a<=1.011m | |
Mitsubishielectric Gx Works3 | >=1.015r<=1.086q | |
Mitsubishielectric Gx Works3 | >=1.087r | |
Mitsubishi Electric 1.096A and later (affected by CVE-2022-29827, CVE-2022-29828, CVE-2022-29832, CVE-2022-29833) | ||
Mitsubishi Electric MX OPC UA Module Configurator-R: 1.08J and prior (affected by CVE-2022-25164) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29829 is a vulnerability known as Use of Hard-coded Cryptographic Key in Mitsubishi Electric GX Works3, GT Designer3, and Motion Control Setting software. It allows remote unauthenticated attackers to exploit the system.
GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C, and Motion Control Setting (GX Works3 related software) versions from 1.035M to 1.042U are affected by CVE-2022-29829.
CVE-2022-29829 has a severity score of 7.5, which is considered high.
Remote unauthenticated attackers can exploit CVE-2022-29829 by leveraging the hard-coded cryptographic key vulnerability in the affected Mitsubishi Electric software.
Yes, Mitsubishi Electric has released a security advisory with mitigation measures to address the vulnerability. Please refer to the provided references for more information.