CVE编号
CVE-2022-23129利用情况
暂无补丁情况
N/A披露时间
2022-01-22漏洞描述
Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://jvn.jp/vu/JVNVU95403720/index.html | |
https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | iconics | genesis64 | * |
From (including) 10.90 |
Up to (including) 10.97 |
||||
运行在以下环境 | |||||||||
应用 | mitsubishielectric | mc_works64 | * |
Up to (excluding) 10.95.210.01 |
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
还没有评论,来说两句吧...