CVE-2022-29518

Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting's account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:koyoele:remote_gc:-:*:*:*:*:*:*:*
cpe:2.3:a:koyoele:screen_creator_advance_2:*:*:*:*:*:*:*:*
cpe:2.3:a:koyoele:screen_creator_advance_2:0.1.1.3:-:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:koyoele:gc-a22w-cw_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a22w-cw:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:koyoele:gc-a24_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a24:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:koyoele:gc-a24-m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a24-m:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:koyoele:gc-a24w-c\(w\)_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a24w-c\(w\):-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:koyoele:gc-a25_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a25:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:koyoele:gc-a26_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a26:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:koyoele:gc-a26-j2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a26-j2:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:koyoele:gc-a26w-c\(w\)_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:koyoele:gc-a26w-c\(w\):-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:59

Type Values Removed Values Added
References () https://jvn.jp/en/jp/JVN50337155/index.html - Third Party Advisory () https://jvn.jp/en/jp/JVN50337155/index.html - Third Party Advisory
References () https://www.koyoele.co.jp/en/topics/202205095016/ - Vendor Advisory () https://www.koyoele.co.jp/en/topics/202205095016/ - Vendor Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-287 NVD-CWE-Other

Information

Published : 2022-05-18 15:15

Updated : 2024-11-21 06:59


NVD link : CVE-2022-29518

Mitre link : CVE-2022-29518

CVE.ORG link : CVE-2022-29518


JSON object : View

Products Affected

koyoele

  • gc-a24-m
  • gc-a24_firmware
  • gc-a26
  • gc-a24-m_firmware
  • gc-a26w-c\(w\)_firmware
  • gc-a25
  • remote_gc
  • gc-a22w-cw
  • screen_creator_advance_2
  • gc-a22w-cw_firmware
  • gc-a24w-c\(w\)_firmware
  • gc-a24
  • gc-a26_firmware
  • gc-a25_firmware
  • gc-a26-j2_firmware
  • gc-a26-j2
  • gc-a24w-c\(w\)
  • gc-a26w-c\(w\)