First published: Wed Jul 20 2022(Updated: )
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server.
Credit: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS GENESIS64 | =10.97 | |
ICONICS GENESIS64 | =10.97.1 | |
Mitsubishielectric Mc Works64 | <=10.95.210.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-33318 is critical.
CVE-2022-33318 affects ICONICS GENESIS64 versions 10.97.1 and prior.
CVE-2022-33318 affects Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior.
An attacker can exploit CVE-2022-33318 by sending specially crafted packets to the GENESIS64 or MC Works64 system.
Yes, patches and updates are available to fix CVE-2022-33318. Please refer to the vendor's advisory for more information.