{"uuid": "78d4d3b4-370b-4095-9b3e-f9f553bb98dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25164", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13482", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-25164\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers can gain unauthorized access to the MELSEC CPU module and the MELSEC OPC UA server module.\n\ud83d\udccf Published: 2022-11-24T23:21:25.536Z\n\ud83d\udccf Modified: 2025-04-25T17:52:48.881Z\n\ud83d\udd17 References:\n1. https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf\n2. https://jvn.jp/vu/JVNVU97244961/index.html\n3. https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05", "creation_timestamp": "2025-04-25T18:08:15.000000Z"}