CVE-2022-25164: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GX Works3
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers can gain unauthorized access to the MELSEC CPU module and the MELSEC OPC UA server module.
AI Analysis
Technical Summary
CVE-2022-25164 is a vulnerability identified in Mitsubishi Electric Corporation's GX Works3 software versions 1.000A through 1.095Z, as well as in the Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and earlier. The vulnerability is categorized under CWE-312, which pertains to the cleartext storage of sensitive information. Specifically, this flaw allows sensitive information to be stored without encryption or adequate protection, making it accessible to unauthorized parties. An unauthenticated remote attacker can exploit this vulnerability to disclose sensitive data, which in turn can lead to unauthorized access to critical industrial control system components, namely the MELSEC CPU module and the MELSEC OPC UA server module. These modules are integral to the operation and communication within Mitsubishi Electric's programmable logic controllers (PLCs) and OPC UA servers, which are widely used in industrial automation environments. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the potential for attackers to leverage this flaw to gain unauthorized control or access to industrial systems poses a significant security concern. The lack of available patches at the time of reporting further exacerbates the risk, necessitating immediate attention from affected organizations to mitigate potential exploitation.
Potential Impact
For European organizations, especially those operating in sectors reliant on industrial automation such as manufacturing, energy, transportation, and critical infrastructure, this vulnerability presents a substantial risk. Unauthorized access to MELSEC CPU modules and OPC UA server modules could lead to manipulation or disruption of industrial processes, potentially causing operational downtime, safety hazards, and financial losses. The confidentiality breach of sensitive configuration or operational data could also facilitate further targeted attacks or industrial espionage. Given the widespread use of Mitsubishi Electric's automation products across Europe, exploitation could impact a broad range of industries and critical infrastructure providers. The vulnerability's ability to be exploited remotely and without authentication increases the attack surface, making it a viable vector for threat actors aiming to disrupt industrial operations or gain footholds within operational technology (OT) networks. The potential cascading effects include compromised system integrity, loss of availability of essential services, and erosion of trust in industrial control systems, which are vital for Europe's economic and security stability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Conduct an immediate inventory of all Mitsubishi Electric GX Works3 and MX OPC UA Module Configurator-R installations to identify affected versions. 2) Apply any available vendor patches or updates as soon as they are released; if patches are not yet available, engage with Mitsubishi Electric support for guidance or interim fixes. 3) Restrict network access to MELSEC CPU modules and OPC UA server modules by implementing strict network segmentation and firewall rules, limiting exposure to trusted management networks only. 4) Employ encryption and secure communication protocols where possible to protect sensitive data in transit and at rest, supplementing the software's default protections. 5) Monitor network traffic and system logs for unusual access patterns or unauthorized attempts to access the affected modules. 6) Implement multi-factor authentication and strong access controls on systems interfacing with the affected modules to reduce the risk of unauthorized exploitation. 7) Conduct regular security awareness training for OT personnel to recognize and respond to potential intrusion attempts. 8) Develop and test incident response plans specifically tailored to industrial control system compromises to ensure rapid containment and recovery.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Czech Republic, Sweden
CVE-2022-25164: CWE-312 Cleartext Storage of Sensitive Information in Mitsubishi Electric Corporation GX Works3
Description
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers can gain unauthorized access to the MELSEC CPU module and the MELSEC OPC UA server module.
AI-Powered Analysis
Technical Analysis
CVE-2022-25164 is a vulnerability identified in Mitsubishi Electric Corporation's GX Works3 software versions 1.000A through 1.095Z, as well as in the Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and earlier. The vulnerability is categorized under CWE-312, which pertains to the cleartext storage of sensitive information. Specifically, this flaw allows sensitive information to be stored without encryption or adequate protection, making it accessible to unauthorized parties. An unauthenticated remote attacker can exploit this vulnerability to disclose sensitive data, which in turn can lead to unauthorized access to critical industrial control system components, namely the MELSEC CPU module and the MELSEC OPC UA server module. These modules are integral to the operation and communication within Mitsubishi Electric's programmable logic controllers (PLCs) and OPC UA servers, which are widely used in industrial automation environments. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the potential for attackers to leverage this flaw to gain unauthorized control or access to industrial systems poses a significant security concern. The lack of available patches at the time of reporting further exacerbates the risk, necessitating immediate attention from affected organizations to mitigate potential exploitation.
Potential Impact
For European organizations, especially those operating in sectors reliant on industrial automation such as manufacturing, energy, transportation, and critical infrastructure, this vulnerability presents a substantial risk. Unauthorized access to MELSEC CPU modules and OPC UA server modules could lead to manipulation or disruption of industrial processes, potentially causing operational downtime, safety hazards, and financial losses. The confidentiality breach of sensitive configuration or operational data could also facilitate further targeted attacks or industrial espionage. Given the widespread use of Mitsubishi Electric's automation products across Europe, exploitation could impact a broad range of industries and critical infrastructure providers. The vulnerability's ability to be exploited remotely and without authentication increases the attack surface, making it a viable vector for threat actors aiming to disrupt industrial operations or gain footholds within operational technology (OT) networks. The potential cascading effects include compromised system integrity, loss of availability of essential services, and erosion of trust in industrial control systems, which are vital for Europe's economic and security stability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Conduct an immediate inventory of all Mitsubishi Electric GX Works3 and MX OPC UA Module Configurator-R installations to identify affected versions. 2) Apply any available vendor patches or updates as soon as they are released; if patches are not yet available, engage with Mitsubishi Electric support for guidance or interim fixes. 3) Restrict network access to MELSEC CPU modules and OPC UA server modules by implementing strict network segmentation and firewall rules, limiting exposure to trusted management networks only. 4) Employ encryption and secure communication protocols where possible to protect sensitive data in transit and at rest, supplementing the software's default protections. 5) Monitor network traffic and system logs for unusual access patterns or unauthorized attempts to access the affected modules. 6) Implement multi-factor authentication and strong access controls on systems interfacing with the affected modules to reduce the risk of unauthorized exploitation. 7) Conduct regular security awareness training for OT personnel to recognize and respond to potential intrusion attempts. 8) Develop and test incident response plans specifically tailored to industrial control system compromises to ensure rapid containment and recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2022-02-14T22:38:29.671Z
- Cisa Enriched
- true
Threat ID: 682d983ec4522896dcbf0004
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 3:04:14 PM
Last updated: 7/29/2025, 2:58:45 PM
Views: 11
Related Threats
CVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.