Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-23127 (GCVE-0-2022-23127)
Vulnerability from cvelistv5 – Published: 2022-01-21 18:17 – Updated: 2024-08-03 03:36- Cross-site Scripting
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Mitsubishi Electric MC Works64; ICONICS MobileHMI |
Affected:
Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior
Affected: ICONICS MobileHMI versions 10.96.2 and prior |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:36:20.098Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mitsubishi Electric MC Works64; ICONICS MobileHMI",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior"
},
{
"status": "affected",
"version": "ICONICS MobileHMI versions 10.96.2 and prior"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Cross-site Scripting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-21T18:17:32.000Z",
"orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad",
"shortName": "Mitsubishi"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"ID": "CVE-2022-23127",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MC Works64; ICONICS MobileHMI",
"version": {
"version_data": [
{
"version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior"
},
{
"version_value": "ICONICS MobileHMI versions 10.96.2 and prior"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site Scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/vu/JVNVU95403720/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
},
{
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01",
"refsource": "MISC",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad",
"assignerShortName": "Mitsubishi",
"cveId": "CVE-2022-23127",
"datePublished": "2022-01-21T18:17:32.000Z",
"dateReserved": "2022-01-11T00:00:00.000Z",
"dateUpdated": "2024-08-03T03:36:20.098Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-23127\",\"sourceIdentifier\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"published\":\"2022-01-21T19:15:09.913\",\"lastModified\":\"2024-11-21T06:48:03.273\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de tipo Cross-site Scripting en Mitsubishi Electric MC Works64 versiones 4.04E (10.95.210.01) y anteriores, y en ICONICS MobileHMI versiones 10.96.2 y anteriores, permite a un atacante remoto no autenticado conseguir informaci\u00f3n de autenticaci\u00f3n de un MC Works64 o MobileHMI y llevar a cabo cualquier operaci\u00f3n usando la informaci\u00f3n de autenticaci\u00f3n adquirida, inyectando un script malicioso en la URL de una pantalla de monitorizaci\u00f3n entregada desde el servidor MC Works64 o el servidor MobileHMI a una aplicaci\u00f3n para dispositivos m\u00f3viles y llevando a un usuario leg\u00edtimo a acceder a esta URL\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iconics:mobilehmi:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.96.2\",\"matchCriteriaId\":\"AE5EB5D9-0582-4C46-8D3C-34B8AE1E24BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.95.210.01\",\"matchCriteriaId\":\"D31E1BFD-8194-4BA1-998B-BC4005454C15\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/vu/JVNVU95403720/index.html\",\"source\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01\",\"source\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\",\"VDB Entry\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf\",\"source\":\"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/vu/JVNVU95403720/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\",\"US Government Resource\",\"VDB Entry\"]},{\"url\":\"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}"
}
}
GSD-2022-23127
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-23127",
"description": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.",
"id": "GSD-2022-23127"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-23127"
],
"details": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.",
"id": "GSD-2022-23127",
"modified": "2023-12-13T01:19:35.556409Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"ID": "CVE-2022-23127",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mitsubishi Electric MC Works64; ICONICS MobileHMI",
"version": {
"version_data": [
{
"version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior"
},
{
"version_value": "ICONICS MobileHMI versions 10.96.2 and prior"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site Scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jvn.jp/vu/JVNVU95403720/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf",
"refsource": "MISC",
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
},
{
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01",
"refsource": "MISC",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iconics:mobilehmi:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "10.96.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.95.210.01",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"ID": "CVE-2022-23127"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01",
"refsource": "MISC",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource",
"VDB Entry"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
},
{
"name": "https://jvn.jp/vu/JVNVU95403720/index.html",
"refsource": "MISC",
"tags": [
"Mitigation",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf",
"refsource": "MISC",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2022-01-27T20:03Z",
"publishedDate": "2022-01-21T19:15Z"
}
}
}
VAR-202201-0605
Vulnerability from variot - Updated: 2024-11-23 21:33Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL. Mitsubishi Electric MC Works64 and ICONICS MobileHMI Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. An attacker could exploit this vulnerability to execute JavaScript code on the client side
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202201-0605",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mc works64",
"scope": "lt",
"trust": 1.0,
"vendor": "mitsubishielectric",
"version": "10.95.210.01"
},
{
"model": "mobilehmi",
"scope": "lte",
"trust": 1.0,
"vendor": "iconics",
"version": "10.96.2"
},
{
"model": "mc works64",
"scope": "lte",
"trust": 0.8,
"vendor": "\u4e09\u83f1\u96fb\u6a5f",
"version": "4.04e (10.95.210.01) and earlier"
},
{
"model": "mobilehmi",
"scope": null,
"trust": 0.8,
"vendor": "iconics",
"version": null
},
{
"model": "electric mc works64",
"scope": "lt",
"trust": 0.6,
"vendor": "mitsubishi",
"version": "10.95.210.01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ICONICS and Mitsubishi Electric reported these vulnerabilities to CISA.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
}
],
"trust": 0.6
},
"cve": "CVE-2022-23127",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2022-23127",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2022-08219",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2022-23127",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2022-23127",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-23127",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-23127",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-08219",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202201-1854",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2022-23127",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "VULMON",
"id": "CVE-2022-23127"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
},
{
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL. Mitsubishi Electric MC Works64 and ICONICS MobileHMI Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. An attacker could exploit this vulnerability to execute JavaScript code on the client side",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-23127"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "VULMON",
"id": "CVE-2022-23127"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-23127",
"trust": 3.9
},
{
"db": "ICS CERT",
"id": "ICSA-22-020-01",
"trust": 2.5
},
{
"db": "JVN",
"id": "JVNVU95403720",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-08219",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2022.0311",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022012109",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202201-1854",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-23127",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "VULMON",
"id": "CVE-2022-23127"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
},
{
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"id": "VAR-202201-0605",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
}
]
},
"last_update_date": "2024-11-23T21:33:22.098000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top\u00a0Page Mitsubishi Electric Mitsubishi\u00a0Electric\u00a0Corporation",
"trust": 0.8,
"url": "https://iconics.com/"
},
{
"title": "Patch for Mitsubishi Electric MC Works64 Cross-Site Scripting Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/317286"
},
{
"title": "Mitsubishi Electric MC Works64 Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=179842"
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-23305 "
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-RCE "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "VULMON",
"id": "CVE-2022-23127"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.0
},
{
"problemtype": "Cross-site scripting (CWE-79) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
},
{
"trust": 1.7,
"url": "https://jvn.jp/vu/jvnvu95403720/index.html"
},
{
"trust": 1.7,
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-23127"
},
{
"trust": 1.2,
"url": "https://vigilance.fr/vulnerability/iconics-genesis64-four-vulnerabilities-37339"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu95403720/"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-020-01"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.0311"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022012109"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/79.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/alphabugx/cve-2022-23305"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "VULMON",
"id": "CVE-2022-23127"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
},
{
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "VULMON",
"id": "CVE-2022-23127"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
},
{
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-02-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"date": "2022-01-21T00:00:00",
"db": "VULMON",
"id": "CVE-2022-23127"
},
{
"date": "2023-03-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"date": "2022-01-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202201-1854"
},
{
"date": "2022-01-21T19:15:09.913000",
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-02-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"date": "2022-01-27T00:00:00",
"db": "VULMON",
"id": "CVE-2022-23127"
},
{
"date": "2023-03-10T03:26:00",
"db": "JVNDB",
"id": "JVNDB-2022-003885"
},
{
"date": "2022-02-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202201-1854"
},
{
"date": "2024-11-21T06:48:03.273000",
"db": "NVD",
"id": "CVE-2022-23127"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mitsubishi Electric MC Works64 Cross-Site Scripting Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-08219"
},
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202201-1854"
}
],
"trust": 0.6
}
}
ICSA-22-020-01
Vulnerability from csaf_cisa - Published: 2022-01-20 07:00 - Updated: 2026-03-05 07:00{
"document": {
"acknowledgments": [
{
"organization": "Mitsubishi Electric Iconics Digital Solutions",
"summary": "reported these vulnerabilities to CISA"
},
{
"organization": "Mitsubishi Electric",
"summary": "reported these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
"title": "Legal Notice and Terms of Use"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could result in unauthorized access to information or to GENESIS64 and MC Works64 functionality, or the disabling of SQL Server in GENESIS64, ICONICS Suite, MC Works64, or GENESIS32.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States (Mitsubishi Electric Iconics Digital Solutions), Japan (Mitsubishi Electric)",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-22-020-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-020-01.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-22-020-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-020-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/secure-our-world/teach-employees-avoid-phishing"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacks"
}
],
"title": "Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric HMI SCADA (Update B)",
"tracking": {
"current_release_date": "2026-03-05T07:00:00.000000Z",
"generator": {
"date": "2026-03-05T00:05:34.123002Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-22-020-01",
"initial_release_date": "2022-01-20T07:00:00.000000Z",
"revision_history": [
{
"date": "2022-01-20T07:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "IInitial Publication"
},
{
"date": "2026-01-08T00:00:00.000000Z",
"legacy_version": "Update A",
"number": "2",
"summary": "Update A - Added GENESIS32."
},
{
"date": "2026-03-05T00:00:00.000000Z",
"legacy_version": "Update B",
"number": "3",
"summary": "Update B - Fixes for affected versions and typographical errors"
}
],
"status": "draft",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.96.2",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions ICONICS Suite: \u003c=10.96.2",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "ICONICS Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.95.3 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions ICONICS Suite: \u003e=10.95.3 | \u003c=10.97",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "ICONICS Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.90 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions ICONICS Suite: \u003e=10.90 | \u003c=10.97",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "ICONICS Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions ICONICS Suite: \u003c=10.97",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "ICONICS Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.96.2",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions GENESIS64: \u003c=10.96.2",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "GENESIS64"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.95.3 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions GENESIS64: \u003e=10.95.3 | \u003c=10.97",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "GENESIS64"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.90 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions GENESIS64: \u003e=10.90 | \u003c=10.97",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "GENESIS64"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions GENESIS64: \u003c=10.97",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "GENESIS64"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.96.2",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions Hyper Historian: \u003c=10.96.2",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "Hyper Historian"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.95.3 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions Hyper Historian: \u003e=10.95.3 | \u003c=10.97",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "Hyper Historian"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.90 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions Hyper Historian: \u003e=10.90 | \u003c=10.97",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "Hyper Historian"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions Hyper Historian: \u003c=10.97",
"product_id": "CSAFPID-0012"
}
}
],
"category": "product_name",
"name": "Hyper Historian"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.96.2",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions AnalytiX: \u003c=10.96.2",
"product_id": "CSAFPID-0013"
}
}
],
"category": "product_name",
"name": "AnalytiX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.95.3 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions AnalytiX: \u003e=10.95.3 | \u003c=10.97",
"product_id": "CSAFPID-0014"
}
}
],
"category": "product_name",
"name": "AnalytiX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.90 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions AnalytiX: \u003e=10.90 | \u003c=10.97",
"product_id": "CSAFPID-0015"
}
}
],
"category": "product_name",
"name": "AnalytiX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions AnalytiX: \u003c=10.97",
"product_id": "CSAFPID-0016"
}
}
],
"category": "product_name",
"name": "AnalytiX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.96.2",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions MobileHMI: \u003c=10.96.2",
"product_id": "CSAFPID-0017"
}
}
],
"category": "product_name",
"name": "MobileHMI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.95.3 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions MobileHMI: \u003e=10.95.3 | \u003c=10.97",
"product_id": "CSAFPID-0018"
}
}
],
"category": "product_name",
"name": "MobileHMI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=10.90 | \u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions MobileHMI: \u003e=10.90 | \u003c=10.97",
"product_id": "CSAFPID-0019"
}
}
],
"category": "product_name",
"name": "MobileHMI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10.97",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions MobileHMI: \u003c=10.97",
"product_id": "CSAFPID-0020"
}
}
],
"category": "product_name",
"name": "MobileHMI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=9.7",
"product": {
"name": "Mitsubishi Electric Iconics Digital Solutions GENESIS32: \u003c=9.7",
"product_id": "CSAFPID-0021"
}
}
],
"category": "product_name",
"name": "GENESIS32"
}
],
"category": "vendor",
"name": "Mitsubishi Electric Iconics Digital Solutions"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "10.97",
"product": {
"name": "Mitsubishi Electric ICONICS Suite: 10.97",
"product_id": "CSAFPID-0022"
}
}
],
"category": "product_name",
"name": "ICONICS Suite"
},
{
"branches": [
{
"category": "product_version",
"name": "10.97",
"product": {
"name": "Mitsubishi Electric GENESIS64: 10.97",
"product_id": "CSAFPID-0023"
}
}
],
"category": "product_name",
"name": "GENESIS64"
},
{
"branches": [
{
"category": "product_version",
"name": "10.97",
"product": {
"name": "Mitsubishi Electric Hyper Historian: 10.97",
"product_id": "CSAFPID-0024"
}
}
],
"category": "product_name",
"name": "Hyper Historian"
},
{
"branches": [
{
"category": "product_version",
"name": "10.97",
"product": {
"name": "Mitsubishi Electric AnalytiX: 10.97",
"product_id": "CSAFPID-0025"
}
}
],
"category": "product_name",
"name": "AnalytiX"
},
{
"branches": [
{
"category": "product_version",
"name": "10.97",
"product": {
"name": "Mitsubishi Electric MobileHMI: 10.97",
"product_id": "CSAFPID-0026"
}
}
],
"category": "product_name",
"name": "MobileHMI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=9.7",
"product": {
"name": "Mitsubishi Electric GENESIS32: \u003c=9.7",
"product_id": "CSAFPID-0027"
}
}
],
"category": "product_name",
"name": "GENESIS32"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=4.04E",
"product": {
"name": "Mitsubishi Electric MC Works64: \u003c=4.04E",
"product_id": "CSAFPID-0028"
}
}
],
"category": "product_name",
"name": "MC Works64"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=4.00A | \u003c=4.04E",
"product": {
"name": "Mitsubishi Electric MC Works64: \u003e=4.00A | \u003c=4.04E",
"product_id": "CSAFPID-0029"
}
}
],
"category": "product_name",
"name": "MC Works64"
}
],
"category": "vendor",
"name": "Mitsubishi Electric"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23127",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Information disclosure vulnerability due to Improper Neutralization of Input During Web Page Generation (CWE-79) caused by the lack of proper input verification exists in Mitsubishi Electric Iconics Digital Solutions GENESIS64 and ICONICS Suite and Mitsubishi Electric MC Works64.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:N/T:P/2026-02-10T00:00:00.000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0005",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0017",
"CSAFPID-0028"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23127"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Mitsubishi Electric Iconics Digital Solutions is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric Iconics Digital Solutions whitepaper on security vulnerabilities, the most recent version of which can be found here. https://iconics.com/About/Security/CERT",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0005",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0017"
],
"url": "https://iconics.com/About/Security/CERT"
},
{
"category": "vendor_fix",
"details": " Mitsubishi Electric is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric security advisory, the most recent version of which can be found here. https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-025_en.pdf",
"product_ids": [
"CSAFPID-0028"
],
"url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-025_en.pdf"
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend locating control system networks and remote devices behind firewalls and isolating them from the business network, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0005",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0017",
"CSAFPID-0028"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend restricting the connection of all control system devices and systems to the network so that they can only be accessed from trusted networks and hosts, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0005",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0017",
"CSAFPID-0028"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend restricting the connection of all control system devices and systems to the network so that they can only be accessed from trusted networks and hosts, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0005",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0017",
"CSAFPID-0028"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0005",
"CSAFPID-0009",
"CSAFPID-0013",
"CSAFPID-0017",
"CSAFPID-0028"
]
}
]
},
{
"cve": "CVE-2022-23128",
"cwe": {
"id": "CWE-184",
"name": "Incomplete List of Disallowed Inputs"
},
"notes": [
{
"category": "summary",
"text": " Authentication bypass vulnerability due to Incomplete List of Disallowed Inputs (CWE-184) exists in Mitsubishi Electric Iconics Digital Solutions GENESIS64 and ICONICS Suite Mitsubishi Electric GENESIS64, ICONICS Suite, and MC Works64.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:Y/T:T/2026-02-10T00:00:00.000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0002",
"CSAFPID-0006",
"CSAFPID-0010",
"CSAFPID-0014",
"CSAFPID-0018",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0029"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23128"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Mitsubishi Electric Iconics Digital Solutions is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric Iconics Digital Solutions whitepaper on security vulnerabilities, the most recent version of which can be found here. https://iconics.com/About/Security/CERT",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0006",
"CSAFPID-0010",
"CSAFPID-0014",
"CSAFPID-0018"
],
"url": "https://iconics.com/About/Security/CERT"
},
{
"category": "vendor_fix",
"details": "Mitsubishi Electric is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric security advisory, the most recent version of which can be found here. https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-026_en.pdf",
"product_ids": [
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0029"
],
"url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-026_en.pdf"
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend switching the communication method of FrameWorX server from WebSocket communication to WCF communication and setting \"WebSocketTransport\" element to \"false\" in \"FwxServer.Network.config\" file located in the installation folder of the products, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0006",
"CSAFPID-0010",
"CSAFPID-0014",
"CSAFPID-0018",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0029"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend locating control system networks and remote devices behind firewalls and isolating them from the business network, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0006",
"CSAFPID-0010",
"CSAFPID-0014",
"CSAFPID-0018",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0029"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend restricting the connection of all control system devices and systems to the network so that they can only be accessed from trusted networks and hosts, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0002",
"CSAFPID-0006",
"CSAFPID-0010",
"CSAFPID-0014",
"CSAFPID-0018",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0029"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0002",
"CSAFPID-0006",
"CSAFPID-0010",
"CSAFPID-0014",
"CSAFPID-0018",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0029"
]
}
]
},
{
"cve": "CVE-2022-23129",
"cwe": {
"id": "CWE-256",
"name": "Plaintext Storage of a Password"
},
"notes": [
{
"category": "summary",
"text": "Information disclosure vulnerability due to Plaintext Storage of a Password (CWE-256) exists in Mitsubishi Electric Iconics Digital Solutions GENESIS64 and ICONICS Suite and Mitsubishi Electric GENESIS64, ICONICS Suite, and MC Works64.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:N/T:T/2026-02-10T00:00:00.000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23129"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Mitsubishi Electric Iconics Digital Solutions is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric Iconics Digital Solutions whitepaper on security vulnerabilities, the most recent version of which can be found here. https://iconics.com/About/Security/CERT",
"product_ids": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019"
],
"url": "https://iconics.com/About/Security/CERT"
},
{
"category": "vendor_fix",
"details": "Mitsubishi Electric is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric security advisory, the most recent version of which can be found here. https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-027_en.pdf",
"product_ids": [
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
],
"url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-027_en.pdf"
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend deleting the authentication information (password) of the SQL database in the CSV file, after exporting the configuration information of GridWorX to the CSV file, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend deleting the authentication information (password) of the SQL database, before exporting the configuration information of GridWorX to the CSV file, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend changing the configuration of the security function so that users other than administrator is not authorized to export the configuration information of GridWorX to a CSV file, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend locating control system networks and remote devices behind firewalls and isolating them from the business network, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend restricting the connection of all control system devices and systems to the network so that they can only be accessed from trusted networks and hosts, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0003",
"CSAFPID-0007",
"CSAFPID-0011",
"CSAFPID-0015",
"CSAFPID-0019",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0028"
]
}
]
},
{
"cve": "CVE-2022-23130",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "summary",
"text": " Denial-of-Service (DoS) vulnerability due to Buffer Over-read (CWE-126) exists in database server of Mitsubishi Electric Iconics Digital Solutions GENESIS64, ICONICS, and GENESIS32 Suite and Mitsubishi Electric GENESIS64, ICONICS Suite, GENESIS32, and MC Works64.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:N/T:P/2026-02-10T00:00:00.000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0004",
"CSAFPID-0008",
"CSAFPID-0012",
"CSAFPID-0016",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0029"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23130"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Mitsubishi Electric Iconics Digital Solutions is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric Iconics Digital Solutions whitepaper on security vulnerabilities, the most recent version of which can be found here. https://iconics.com/About/Security/CERT",
"product_ids": [
"CSAFPID-0004",
"CSAFPID-0008",
"CSAFPID-0012",
"CSAFPID-0016",
"CSAFPID-0020"
],
"url": "https://iconics.com/About/Security/CERT"
},
{
"category": "vendor_fix",
"details": "Mitsubishi Electric is releasing security updates for the affected products as critical fixes/rollup releases. For more information on the security updates, refer to the Mitsubishi Electric security advisory, the most recent version of which can be found here. https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-028_en.pdf",
"product_ids": [
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0029"
],
"url": "https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2021-028_en.pdf"
},
{
"category": "no_fix_planned",
"details": "There are no plans to release a security update for GENESIS32. To minimize the risk of exploitation of this vulnerability, please consider replacing to GENESIS64 or ICONICS Suite.",
"product_ids": [
"CSAFPID-0021",
"CSAFPID-0027"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend locating control system networks and remote devices behind firewalls and isolating them from the business network, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0004",
"CSAFPID-0008",
"CSAFPID-0012",
"CSAFPID-0016",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0029"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend restricting the connection of all control system devices and systems to the network so that they can only be accessed from trusted networks and hosts, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0004",
"CSAFPID-0008",
"CSAFPID-0012",
"CSAFPID-0016",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0029"
]
},
{
"category": "mitigation",
"details": "For customers who cannot immediately update the product, Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommend avoiding clicking on web links in emails etc. from untrusted sources, and avoiding opening files attached to untrusted emails, to minimize the risk of exploiting this vulnerability.",
"product_ids": [
"CSAFPID-0004",
"CSAFPID-0008",
"CSAFPID-0012",
"CSAFPID-0016",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0029"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0004",
"CSAFPID-0008",
"CSAFPID-0012",
"CSAFPID-0016",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0029"
]
}
]
}
]
}
FKIE_CVE-2022-23127
Vulnerability from fkie_nvd - Published: 2022-01-21 19:15 - Updated: 2024-11-21 06:48| URL | Tags | ||
|---|---|---|---|
| Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp | https://jvn.jp/vu/JVNVU95403720/index.html | Mitigation, Third Party Advisory, VDB Entry | |
| Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp | https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01 | Mitigation, Third Party Advisory, US Government Resource, VDB Entry | |
| Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU95403720/index.html | Mitigation, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01 | Mitigation, Third Party Advisory, US Government Resource, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf | Mitigation, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| iconics | mobilehmi | * | |
| mitsubishielectric | mc_works64 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iconics:mobilehmi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE5EB5D9-0582-4C46-8D3C-34B8AE1E24BB",
"versionEndIncluding": "10.96.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D31E1BFD-8194-4BA1-998B-BC4005454C15",
"versionEndExcluding": "10.95.210.01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL."
},
{
"lang": "es",
"value": "Una vulnerabilidad de tipo Cross-site Scripting en Mitsubishi Electric MC Works64 versiones 4.04E (10.95.210.01) y anteriores, y en ICONICS MobileHMI versiones 10.96.2 y anteriores, permite a un atacante remoto no autenticado conseguir informaci\u00f3n de autenticaci\u00f3n de un MC Works64 o MobileHMI y llevar a cabo cualquier operaci\u00f3n usando la informaci\u00f3n de autenticaci\u00f3n adquirida, inyectando un script malicioso en la URL de una pantalla de monitorizaci\u00f3n entregada desde el servidor MC Works64 o el servidor MobileHMI a una aplicaci\u00f3n para dispositivos m\u00f3viles y llevando a un usuario leg\u00edtimo a acceder a esta URL"
}
],
"id": "CVE-2022-23127",
"lastModified": "2024-11-21T06:48:03.273",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-01-21T19:15:09.913",
"references": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Mitigation",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource",
"VDB Entry"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
},
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource",
"VDB Entry"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
}
],
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2022-08219
Vulnerability from cnvd - Published: 2022-02-03厂商已发布了漏洞修复程序,请及时关注更新: https://iconics.com/Support/CERT
| Name | Mitsubishi Electric MC Works64 <10.95.210.01 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-23127",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-23127"
}
},
"description": "Mitsubishi Electric MC Works64\u662f\u65e5\u672c\u4e09\u83f1\u7535\u673a\uff08Mitsubishi Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u6570\u636e\u91c7\u96c6\u4e0e\u76d1\u63a7\u7cfb\u7edf\uff08SCADA\uff09\u3002\n\nMitsubishi Electric MC Works64\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f3a\u5c11\u5bf9\u7528\u6237\u63d0\u4f9b\u7684\u6570\u636e\u548c\u8f93\u51fa\u7684\u6570\u636e\u6821\u9a8c\u8fc7\u6ee4\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5ba2\u6237\u7aef\u6267\u884cJavaScript\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://iconics.com/Support/CERT",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-08219",
"openTime": "2022-02-03",
"patchDescription": "Mitsubishi Electric MC Works64\u662f\u65e5\u672c\u4e09\u83f1\u7535\u673a\uff08Mitsubishi Electric\uff09\u516c\u53f8\u7684\u4e00\u5957\u6570\u636e\u91c7\u96c6\u4e0e\u76d1\u63a7\u7cfb\u7edf\uff08SCADA\uff09\u3002\r\n\r\nMitsubishi Electric MC Works64\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f3a\u5c11\u5bf9\u7528\u6237\u63d0\u4f9b\u7684\u6570\u636e\u548c\u8f93\u51fa\u7684\u6570\u636e\u6821\u9a8c\u8fc7\u6ee4\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5ba2\u6237\u7aef\u6267\u884cJavaScript\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mitsubishi Electric MC Works64\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Mitsubishi Electric MC Works64 \u003c10.95.210.01"
},
"referenceLink": "https://vigilance.fr/vulnerability/ICONICS-GENESIS64-four-vulnerabilities-37339",
"serverity": "\u4e2d",
"submitTime": "2022-01-23",
"title": "Mitsubishi Electric MC Works64\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}
GHSA-3CCX-8RQ3-28HX
Vulnerability from github – Published: 2022-01-22 00:00 – Updated: 2022-01-28 00:03Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.
{
"affected": [],
"aliases": [
"CVE-2022-23127"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-01-21T19:15:00Z",
"severity": "MODERATE"
},
"details": "Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.",
"id": "GHSA-3ccx-8rq3-28hx",
"modified": "2022-01-28T00:03:13Z",
"published": "2022-01-22T00:00:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23127"
},
{
"type": "WEB",
"url": "https://jvn.jp/vu/JVNVU95403720/index.html"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01"
},
{
"type": "WEB",
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.