Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | Mitigation Third Party Advisory US Government Resource VDB Entry |
https://jvn.jp/vu/JVNVU95403720/index.html | Mitigation Third Party Advisory VDB Entry |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-01-21 11:15
Updated : 2022-01-27 12:09
NVD link : CVE-2022-23129
Mitre link : CVE-2022-23129
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
iconics
- genesis64
mitsubishielectric
- mc_works64