{"api_version":"1","generated_at":"2026-04-23T12:35:25+00:00","cve":"CVE-2022-33317","urls":{"html":"https://cve.report/CVE-2022-33317","api":"https://cve.report/api/cve/CVE-2022-33317.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-33317","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-33317"},"summary":{"title":"CVE-2022-33317","description":"Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes.","state":"PUBLIC","assigner":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published_at":"2022-07-20 17:15:00","updated_at":"2022-07-27 19:02:00"},"problem_types":["CWE-829"],"metrics":[],"references":[{"url":"https://jvn.jp/vu/JVNVU96480474/index.html","name":"https://jvn.jp/vu/JVNVU96480474/index.html","refsource":"MISC","tags":[],"title":"JVNVU#96480474: 三菱電機製GENESIS64およびMC Works64における複数の脆弱性","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-33317","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33317","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"33317","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iconics","cpe5":"genesis64","cpe6":"10.97","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33317","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iconics","cpe5":"genesis64","cpe6":"10.97.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"33317","vulnerable":"1","versionEndIncluding":"10.95.210.01","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitsubishielectric","cpe5":"mc_works64","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-33317","qid":"591052","title":"Mitsubishi Electric GENESIS64 Multiple Vulnerabilities (ICSA-22-202-04) (2022-008)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-33317","ASSIGNER":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"ICONICS GENESIS64; Mitsubishi Electric MC Works64","version":{"version_data":[{"version_value":"ICONICS GENESIS64 versions 10.97.1 and prior"},{"version_value":"Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Inclusion of Functionality from Untrusted Control Sphere"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf"},{"refsource":"MISC","name":"https://jvn.jp/vu/JVNVU96480474/index.html","url":"https://jvn.jp/vu/JVNVU96480474/index.html"}]},"description":{"description_data":[{"lang":"eng","value":"Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes."}]}},"nvd":{"publishedDate":"2022-07-20 17:15:00","lastModifiedDate":"2022-07-27 19:02:00","problem_types":["CWE-829"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*","versionEndIncluding":"10.95.210.01","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}