Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to disclose a file in a legitimate user's product by using previously eavesdropped cleartext information and to counterfeit a legitimate user’s system.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU96577897/index.html | Third Party Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04 | Third Party Advisory US Government Resource |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf | Vendor Advisory |
https://jvn.jp/vu/JVNVU96577897/index.html | Third Party Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04 | Third Party Advisory US Government Resource |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/vu/JVNVU96577897/index.html - Third Party Advisory | |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04 - Third Party Advisory, US Government Resource | |
References | () https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf - Vendor Advisory |
02 Jun 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to disclose a file in a legitimate user's product by using previously eavesdropped cleartext information and to counterfeit a legitimate user’s system. |
08 Apr 2022, 14:31
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04 - Third Party Advisory, US Government Resource | |
References | (MISC) https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf - Vendor Advisory | |
References | (MISC) https://jvn.jp/vu/JVNVU96577897/index.html - Third Party Advisory | |
CWE | CWE-312 | |
CPE | cpe:2.3:h:mitsubishielectric:fx5uj:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-40mt\/es:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-60mt\/ess_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/dss-ts_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-40mr\/es:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-40mt\/ess:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-60mt\/es:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uc:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uc-32mr\/ds-ts_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-60mr\/es:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-40mt\/es_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-40mr\/es_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/d:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-24mt\/ess:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/ds-ts:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-24mt\/ess_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/dss:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/dss-ts:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-60mr\/es_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/ds-ts_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-60mt\/ess:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-24mt\/es:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uc_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/d_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-24mr\/es_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uc-32mr\/ds-ts:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/dss_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-40mt\/ess_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-60mt\/es_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:mitsubishielectric:fx5uj-24mr\/es:-:*:*:*:*:*:*:* cpe:2.3:o:mitsubishielectric:fx5uj-24mt\/es_firmware:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.9 |
01 Apr 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-01 23:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25160
Mitre link : CVE-2022-25160
CVE.ORG link : CVE-2022-25160
JSON object : View
Products Affected
mitsubishielectric
- fx5uj-24mr\/es
- fx5uj-40mt\/ess_firmware
- fx5uj-60mt\/ess_firmware
- fx5uc-32mr\/ds-ts_firmware
- fx5uj-40mt\/es
- fx5uj-40mr\/es_firmware
- fx5uc-32mt\/dss
- fx5uj-60mr\/es
- fx5uj-24mt\/ess_firmware
- fx5uj-60mt\/es_firmware
- fx5uj-40mt\/ess
- fx5uc-32mt\/d
- fx5uj-60mt\/ess
- fx5uj-24mt\/es
- fx5uj-40mr\/es
- fx5uc-32mt\/dss_firmware
- fx5uj-24mt\/es_firmware
- fx5uj-60mt\/es
- fx5uj
- fx5uc-32mt\/dss-ts_firmware
- fx5uj-40mt\/es_firmware
- fx5uc
- fx5uc_firmware
- fx5uj-24mt\/ess
- fx5uc-32mr\/ds-ts
- fx5uj-24mr\/es_firmware
- fx5uc-32mt\/ds-ts_firmware
- fx5uc-32mt\/d_firmware
- fx5uj_firmware
- fx5uc-32mt\/dss-ts
- fx5uc-32mt\/ds-ts
- fx5uj-60mr\/es_firmware
CWE
CWE-312
Cleartext Storage of Sensitive Information