CVE-2022-29828: CWE-321 Use of Hard-coded Cryptographic Key in Mitsubishi Electric Corporation GX Works3
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project file or execute programs illegally.
AI Analysis
Technical Summary
CVE-2022-29828 is a vulnerability identified in Mitsubishi Electric Corporation's GX Works3 software, starting from version 1.000A and later. GX Works3 is an engineering software used for programming and configuring Mitsubishi PLCs (Programmable Logic Controllers), which are critical components in industrial automation systems. The vulnerability is classified under CWE-321, which pertains to the use of hard-coded cryptographic keys. Specifically, the software contains embedded cryptographic keys that are hard-coded into the application rather than being dynamically generated or securely stored. This design flaw allows a remote, unauthenticated attacker to exploit the vulnerability to disclose sensitive information. The sensitive information includes program code and project files used in the PLC programming environment. Furthermore, attackers may leverage this vulnerability to execute unauthorized programs on the PLCs, potentially altering industrial control processes. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits have been reported in the wild, the presence of hard-coded keys inherently weakens the cryptographic protections and can be reverse-engineered or extracted by attackers with access to the software binaries or network communications. This exposure can lead to unauthorized access to critical industrial control logic, potentially causing operational disruptions or safety hazards in industrial environments.
Potential Impact
For European organizations, especially those operating in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. GX Works3 is widely used in industrial automation across Europe, and exploitation could lead to unauthorized disclosure of proprietary industrial control programs, intellectual property theft, and unauthorized manipulation of PLCs. Such unauthorized control could result in production downtime, safety incidents, or damage to physical equipment. The confidentiality impact is high due to exposure of sensitive project files, the integrity impact is high because attackers can execute unauthorized programs, and availability could be affected if malicious programs disrupt normal operations. Given the critical role of PLCs in industrial environments, exploitation could have cascading effects on supply chains and critical services. The lack of authentication requirement and remote exploitability increase the threat level, making it easier for attackers to target vulnerable systems from outside the network perimeter. European organizations with insufficient network segmentation or weak perimeter defenses are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Apply patches or updates from Mitsubishi Electric as soon as they become available. Since no patch links are currently provided, organizations should maintain close communication with the vendor for updates. 2) Implement strict network segmentation to isolate industrial control systems and GX Works3 environments from general IT networks and the internet, reducing exposure to remote attacks. 3) Employ strong access controls and monitoring on systems running GX Works3 to detect unauthorized access attempts or anomalous behavior. 4) Use application whitelisting and code integrity verification on PLCs to prevent execution of unauthorized programs. 5) Conduct regular security audits and code reviews of PLC programs to detect unauthorized changes. 6) Educate engineering and operational staff about the risks of hard-coded keys and encourage secure key management practices. 7) Consider deploying intrusion detection systems tailored for industrial protocols to identify exploitation attempts. 8) If possible, replace or upgrade legacy systems that rely on vulnerable versions of GX Works3 with more secure alternatives. These measures go beyond generic advice by focusing on network architecture, operational controls, and vendor engagement specific to industrial control environments.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Spain, Czech Republic
CVE-2022-29828: CWE-321 Use of Hard-coded Cryptographic Key in Mitsubishi Electric Corporation GX Works3
Description
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project file or execute programs illegally.
AI-Powered Analysis
Technical Analysis
CVE-2022-29828 is a vulnerability identified in Mitsubishi Electric Corporation's GX Works3 software, starting from version 1.000A and later. GX Works3 is an engineering software used for programming and configuring Mitsubishi PLCs (Programmable Logic Controllers), which are critical components in industrial automation systems. The vulnerability is classified under CWE-321, which pertains to the use of hard-coded cryptographic keys. Specifically, the software contains embedded cryptographic keys that are hard-coded into the application rather than being dynamically generated or securely stored. This design flaw allows a remote, unauthenticated attacker to exploit the vulnerability to disclose sensitive information. The sensitive information includes program code and project files used in the PLC programming environment. Furthermore, attackers may leverage this vulnerability to execute unauthorized programs on the PLCs, potentially altering industrial control processes. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits have been reported in the wild, the presence of hard-coded keys inherently weakens the cryptographic protections and can be reverse-engineered or extracted by attackers with access to the software binaries or network communications. This exposure can lead to unauthorized access to critical industrial control logic, potentially causing operational disruptions or safety hazards in industrial environments.
Potential Impact
For European organizations, especially those operating in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. GX Works3 is widely used in industrial automation across Europe, and exploitation could lead to unauthorized disclosure of proprietary industrial control programs, intellectual property theft, and unauthorized manipulation of PLCs. Such unauthorized control could result in production downtime, safety incidents, or damage to physical equipment. The confidentiality impact is high due to exposure of sensitive project files, the integrity impact is high because attackers can execute unauthorized programs, and availability could be affected if malicious programs disrupt normal operations. Given the critical role of PLCs in industrial environments, exploitation could have cascading effects on supply chains and critical services. The lack of authentication requirement and remote exploitability increase the threat level, making it easier for attackers to target vulnerable systems from outside the network perimeter. European organizations with insufficient network segmentation or weak perimeter defenses are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Apply patches or updates from Mitsubishi Electric as soon as they become available. Since no patch links are currently provided, organizations should maintain close communication with the vendor for updates. 2) Implement strict network segmentation to isolate industrial control systems and GX Works3 environments from general IT networks and the internet, reducing exposure to remote attacks. 3) Employ strong access controls and monitoring on systems running GX Works3 to detect unauthorized access attempts or anomalous behavior. 4) Use application whitelisting and code integrity verification on PLCs to prevent execution of unauthorized programs. 5) Conduct regular security audits and code reviews of PLC programs to detect unauthorized changes. 6) Educate engineering and operational staff about the risks of hard-coded keys and encourage secure key management practices. 7) Consider deploying intrusion detection systems tailored for industrial protocols to identify exploitation attempts. 8) If possible, replace or upgrade legacy systems that rely on vulnerable versions of GX Works3 with more secure alternatives. These measures go beyond generic advice by focusing on network architecture, operational controls, and vendor engagement specific to industrial control environments.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mitsubishi
- Date Reserved
- 2022-04-27T20:47:43.443Z
- Cisa Enriched
- true
Threat ID: 682d983ec4522896dcbf0024
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 2:53:29 PM
Last updated: 2/7/2026, 10:25:59 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.