Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU95403720/index.html | Mitigation Third Party Advisory VDB Entry |
https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | Mitigation Third Party Advisory US Government Resource VDB Entry |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-01-21 19:15
Updated : 2024-02-28 18:48
NVD link : CVE-2022-23129
Mitre link : CVE-2022-23129
CVE.ORG link : CVE-2022-23129
JSON object : View
Products Affected
mitsubishielectric
- mc_works64
iconics
- genesis64
CWE
CWE-312
Cleartext Storage of Sensitive Information