Vulnerability Details : CVE-2022-23127
Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2022-23127
- cpe:2.3:a:iconics:mobilehmi:*:*:*:*:*:*:*:*
- cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23127
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23127
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2022-23127
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-23127
-
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-025_en.pdf
Mitigation;Vendor Advisory
-
https://jvn.jp/vu/JVNVU95403720/index.html
JVNVU#95403720: 三菱電機製GENESIS64およびMC Works64における複数の脆弱性Mitigation;Third Party Advisory;VDB Entry
-
https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01
ICONICS and Mitsubishi Electric HMI SCADA | CISAMitigation;Third Party Advisory;US Government Resource;VDB Entry
Jump to