CVE-2022-29830

9.1 CRITICAL
Published: November 25, 2022 Modified: November 07, 2025

Description

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z, and Motion Control Setting(GX Works3 related software) versions from 1.000A to 1.065T allows a remote unauthenticated attacker to disclose or tamper with sensitive information. As a result, unauthenticated attackers may obtain information about project files illegally.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://jvn.jp/vu/JVNVU97244961/index.html
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Third Party Advisory VDB Entry
https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Mitigation Vendor Advisory
https://jvn.jp/vu/JVNVU97244961/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Mitigation Vendor Advisory

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.1 / 10.0
EPSS (Exploit Probability)
1.5%
81th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mitsubishielectric