CVE-2022-23129
Summary
| CVE | CVE-2022-23129 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-01-21 19:15:00 UTC |
| Updated | 2022-01-27 20:09:00 UTC |
| Description | Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information. |
Risk And Classification
Problem Types: CWE-312
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Iconics | Genesis64 | All | All | All | All |
| Application | Mitsubishielectric | Mc Works64 | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf | MISC | www.mitsubishielectric.com | |
| JVNVU#95403720: 三菱電機製GENESIS64およびMC Works64における複数の脆弱性 | MISC | jvn.jp | |
| ICONICS and Mitsubishi Electric HMI SCADA | CISA | MISC | us-cert.cisa.gov | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.