Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A to 4.04E, Mitsubishi Electric GENESIS64 versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 and prior, Mitsubishi Electric ICONICS Suite versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 and prior, Mitsubishi Electric GENESIS32 versions 9.7 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64, ICONICS Suite, MC Works64, or GENESIS32 and execute commands against the database from GENESIS64, ICONICS Suite, MC Works64, or GENESIS32.
References
| Link | Resource |
|---|---|
| https://jvn.jp/vu/JVNVU95403720/index.html | Mitigation Third Party Advisory VDB Entry |
| https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | Mitigation Third Party Advisory US Government Resource VDB Entry |
| https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf | Mitigation Vendor Advisory |
| https://jvn.jp/vu/JVNVU95403720/index.html | Mitigation Third Party Advisory VDB Entry |
| https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | Mitigation Third Party Advisory US Government Resource VDB Entry |
| https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Jan 2026, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-126 | |
| CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.9 |
| Summary | (en) Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A to 4.04E, Mitsubishi Electric GENESIS64 versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 and prior, Mitsubishi Electric ICONICS Suite versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 and prior, Mitsubishi Electric GENESIS32 versions 9.7 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64, ICONICS Suite, MC Works64, or GENESIS32 and execute commands against the database from GENESIS64, ICONICS Suite, MC Works64, or GENESIS32. |
21 Nov 2024, 06:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://jvn.jp/vu/JVNVU95403720/index.html - Mitigation, Third Party Advisory, VDB Entry | |
| References | () https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 - Mitigation, Third Party Advisory, US Government Resource, VDB Entry | |
| References | () https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf - Mitigation, Vendor Advisory |
Information
Published : 2022-01-21 19:15
Updated : 2026-01-08 12:15
NVD link : CVE-2022-23130
Mitre link : CVE-2022-23130
CVE.ORG link : CVE-2022-23130
JSON object : View
Products Affected
mitsubishielectric
- mc_works64
iconics
- hyper_historian
- genesis64
