First published: Wed Jul 20 2022(Updated: )
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS GENESIS64 | =10.97 | |
ICONICS GENESIS64 | =10.97.1 | |
Mitsubishielectric Mc Works64 | <=10.95.210.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-33315.
The affected software includes ICONICS GENESIS64 versions 10.97.1 and prior, and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior.
The severity of CVE-2022-33315 is high, with a CVSS score of 7.8.
CVE-2022-33315 is a deserialization of untrusted data vulnerability that allows an unauthenticated attacker to execute arbitrary malicious code by leading a user to load a monitoring screen file that includes the attack payload.
Yes, you can find more information about CVE-2022-33315 at the following references: - [JVN](https://jvn.jp/vu/JVNVU96480474/index.html) - [Mitsubishi Electric PSIRT](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf)