Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules.
References
| Link | Resource |
|---|---|
| https://jvn.jp/vu/JVNVU97244961 | Third Party Advisory VDB Entry |
| https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf | Mitigation Vendor Advisory |
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05 |
Configurations
Configuration 1 (hide)
|
History
29 Jun 2023, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules. |
31 May 2023, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules. |
Information
Published : 2022-11-25 00:15
Updated : 2023-06-29 05:15
NVD link : CVE-2022-29831
Mitre link : CVE-2022-29831
JSON object : View
Products Affected
mitsubishielectric
- gx_works3
CWE
CWE-798
Use of Hard-coded Credentials
