First published: Thu Nov 24 2022(Updated: )
Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Mitsubishielectric Gx Works3 | >=1.015r<=1.086q | |
Mitsubishielectric Gx Works3 | >=1.087r | |
Mitsubishi Electric 1.096A and later (affected by CVE-2022-29827, CVE-2022-29828, CVE-2022-29832, CVE-2022-29833) | ||
Mitsubishi Electric MX OPC UA Module Configurator-R: 1.08J and prior (affected by CVE-2022-25164) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29831 is a use of hard-coded password vulnerability in Mitsubishi Electric Corporation GX Works3 software.
CVE-2022-29831 has a severity rating of 7.5 (high).
Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z are affected by CVE-2022-29831.
A remote unauthenticated attacker can exploit CVE-2022-29831 to obtain information about the project file for MELSEC safety CPU modules.
Yes, you can find references for CVE-2022-29831 at the following links: [Reference 1](https://jvn.jp/vu/JVNVU97244961), [Reference 2](https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05), [Reference 3](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf).