Skip to main content

CVE-2022-25164: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GX Works3

Medium
Published: Thu Nov 24 2022 (11/24/2022, 23:21:25 UTC)
Source: CVE
Vendor/Project: Mitsubishi Electric Corporation
Product: GX Works3

Description

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers can gain unauthorized access to the MELSEC CPU module and the MELSEC OPC UA server module.

AI-Powered Analysis

AILast updated: 06/24/2025, 15:04:14 UTC

Technical Analysis

CVE-2022-25164 is a vulnerability identified in Mitsubishi Electric Corporation's GX Works3 software versions 1.000A through 1.095Z, as well as in the Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and earlier. The vulnerability is categorized under CWE-312, which pertains to the cleartext storage of sensitive information. Specifically, this flaw allows sensitive information to be stored without encryption or adequate protection, making it accessible to unauthorized parties. An unauthenticated remote attacker can exploit this vulnerability to disclose sensitive data, which in turn can lead to unauthorized access to critical industrial control system components, namely the MELSEC CPU module and the MELSEC OPC UA server module. These modules are integral to the operation and communication within Mitsubishi Electric's programmable logic controllers (PLCs) and OPC UA servers, which are widely used in industrial automation environments. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the potential for attackers to leverage this flaw to gain unauthorized control or access to industrial systems poses a significant security concern. The lack of available patches at the time of reporting further exacerbates the risk, necessitating immediate attention from affected organizations to mitigate potential exploitation.

Potential Impact

For European organizations, especially those operating in sectors reliant on industrial automation such as manufacturing, energy, transportation, and critical infrastructure, this vulnerability presents a substantial risk. Unauthorized access to MELSEC CPU modules and OPC UA server modules could lead to manipulation or disruption of industrial processes, potentially causing operational downtime, safety hazards, and financial losses. The confidentiality breach of sensitive configuration or operational data could also facilitate further targeted attacks or industrial espionage. Given the widespread use of Mitsubishi Electric's automation products across Europe, exploitation could impact a broad range of industries and critical infrastructure providers. The vulnerability's ability to be exploited remotely and without authentication increases the attack surface, making it a viable vector for threat actors aiming to disrupt industrial operations or gain footholds within operational technology (OT) networks. The potential cascading effects include compromised system integrity, loss of availability of essential services, and erosion of trust in industrial control systems, which are vital for Europe's economic and security stability.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Conduct an immediate inventory of all Mitsubishi Electric GX Works3 and MX OPC UA Module Configurator-R installations to identify affected versions. 2) Apply any available vendor patches or updates as soon as they are released; if patches are not yet available, engage with Mitsubishi Electric support for guidance or interim fixes. 3) Restrict network access to MELSEC CPU modules and OPC UA server modules by implementing strict network segmentation and firewall rules, limiting exposure to trusted management networks only. 4) Employ encryption and secure communication protocols where possible to protect sensitive data in transit and at rest, supplementing the software's default protections. 5) Monitor network traffic and system logs for unusual access patterns or unauthorized attempts to access the affected modules. 6) Implement multi-factor authentication and strong access controls on systems interfacing with the affected modules to reduce the risk of unauthorized exploitation. 7) Conduct regular security awareness training for OT personnel to recognize and respond to potential intrusion attempts. 8) Develop and test incident response plans specifically tailored to industrial control system compromises to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2022-02-14T22:38:29.671Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf0004

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 3:04:14 PM

Last updated: 7/29/2025, 2:58:45 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats