Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU97244961 | Third Party Advisory VDB Entry |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05 | |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Jun 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules. |
31 May 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules. |
Information
Published : 2022-11-25 00:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-29831
Mitre link : CVE-2022-29831
CVE.ORG link : CVE-2022-29831
JSON object : View
Products Affected
mitsubishielectric
- gx_works3