{"api_version":"1","generated_at":"2026-04-23T12:35:25+00:00","cve":"CVE-2022-33315","urls":{"html":"https://cve.report/CVE-2022-33315","api":"https://cve.report/api/cve/CVE-2022-33315.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-33315","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-33315"},"summary":{"title":"CVE-2022-33315","description":"Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.","state":"PUBLIC","assigner":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published_at":"2022-07-20 17:15:00","updated_at":"2022-07-27 19:03:00"},"problem_types":["CWE-502"],"metrics":[],"references":[{"url":"https://jvn.jp/vu/JVNVU96480474/index.html","name":"https://jvn.jp/vu/JVNVU96480474/index.html","refsource":"MISC","tags":[],"title":"JVNVU#96480474: 三菱電機製GENESIS64およびMC Works64における複数の脆弱性","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-33315","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33315","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"33315","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iconics","cpe5":"genesis64","cpe6":"10.97","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33315","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iconics","cpe5":"genesis64","cpe6":"10.97.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33315","vulnerable":"1","versionEndIncluding":"10.95.210.01","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitsubishielectric","cpe5":"mc_works64","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-33315","qid":"591052","title":"Mitsubishi Electric GENESIS64 Multiple Vulnerabilities (ICSA-22-202-04) (2022-008)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-33315","ASSIGNER":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"ICONICS GENESIS64; Mitsubishi Electric MC Works64","version":{"version_data":[{"version_value":"ICONICS GENESIS64 versions 10.97.1 and prior"},{"version_value":"Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Deserialization of Untrusted Data"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf"},{"refsource":"MISC","name":"https://jvn.jp/vu/JVNVU96480474/index.html","url":"https://jvn.jp/vu/JVNVU96480474/index.html"}]},"description":{"description_data":[{"lang":"eng","value":"Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes."}]}},"nvd":{"publishedDate":"2022-07-20 17:15:00","lastModifiedDate":"2022-07-27 19:03:00","problem_types":["CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*","versionEndIncluding":"10.95.210.01","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}