First published: Wed Jul 20 2022(Updated: )
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS GENESIS64 versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 mobile monitoring application and accessing the monitoring screen.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS GENESIS64 | =10.97 | |
ICONICS GENESIS64 | =10.97.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID CVE-2022-29834 refers to an 'Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)' vulnerability in ICONICS GENESIS64 versions 10.97 to 10.97.1.
The severity of CVE-2022-29834 is high with a CVSS score of 7.5.
CVE-2022-29834 allows a remote unauthenticated attacker to access arbitrary files in the GENESIS64 server and disclose sensitive information.
To fix CVE-2022-29834 in ICONICS GENESIS64, it is recommended to apply the necessary security patches provided by ICONICS or upgrade to a non-vulnerable version.
You can find more information about CVE-2022-29834 in the following references: [https://jvn.jp/vu/JVNVU96480474/index.html](https://jvn.jp/vu/JVNVU96480474/index.html) and [https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf)