First published: Wed Jul 20 2022(Updated: )
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS GENESIS64 | =10.97 | |
ICONICS GENESIS64 | =10.97.1 | |
Mitsubishi Electric MC Works64 | <=10.95.210.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33316 is a vulnerability that allows an unauthenticated attacker to execute arbitrary malicious code by leading a user to load a monitoring screen file in certain versions of ICONICS GENESIS64 and Mitsubishi Electric MC Works64.
ICONICS GENESIS64 versions 10.97.1 and prior, as well as Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior, are affected by CVE-2022-33316.
CVE-2022-33316 has a severity rating of 7.8 (high).
An attacker can exploit CVE-2022-33316 by leading a user to load a monitoring screen file that contains malicious code.
Yes, you can find official references for CVE-2022-33316 at the following links: [JVN](https://jvn.jp/vu/JVNVU96480474/index.html) and [Mitsubishi Electric](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf).