Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-29830: CWE-321 Use of Hard-coded Cryptographic Key in Mitsubishi Electric Corporation GX Works3

0
Medium
Published: Thu Nov 24 2022 (11/24/2022, 23:23:51 UTC)
Source: CVE
Vendor/Project: Mitsubishi Electric Corporation
Product: GX Works3

Description

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Motion Control Setting(GX Works3 related software) versions from 1.000A and later allows a remote unauthenticated attacker to disclose or tamper with sensitive information. As a result, unauthenticated attackers may obtain information about project files illegally.

AI-Powered Analysis

AILast updated: 06/24/2025, 14:52:41 UTC

Technical Analysis

CVE-2022-29830 is a vulnerability identified in Mitsubishi Electric Corporation's GX Works3 software, specifically affecting versions from 1.000A to 1.095Z, as well as related Motion Control Setting software versions from 1.000A onward. The vulnerability is categorized under CWE-321, which pertains to the use of hard-coded cryptographic keys. In this case, the software employs a cryptographic key embedded directly in the code rather than generating or securely managing keys dynamically. This design flaw allows a remote, unauthenticated attacker to exploit the hard-coded key to either disclose or tamper with sensitive information, particularly project files managed by the GX Works3 environment. GX Works3 is a programming and configuration tool used for Mitsubishi Electric's programmable logic controllers (PLCs), which are critical components in industrial control systems (ICS) and automation environments. The exploitation does not require authentication or user interaction, increasing the attack surface. By leveraging the hard-coded key, attackers can decrypt or manipulate project files, potentially leading to unauthorized access to intellectual property, modification of control logic, or disruption of industrial processes. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of the data and the critical role of the affected software in industrial automation. The lack of available patches at the time of reporting further exacerbates the risk, necessitating immediate mitigation efforts by affected organizations.

Potential Impact

For European organizations, particularly those operating in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability presents a tangible risk. GX Works3 is widely used in industrial automation, and unauthorized access or tampering with project files can lead to operational disruptions, safety hazards, and intellectual property theft. The confidentiality of proprietary control logic and project configurations is compromised, potentially enabling industrial espionage. Integrity is at risk as attackers could alter control programs, causing malfunctions or unsafe operations. Availability could be indirectly affected if tampering leads to system failures or necessitates shutdowns for remediation. Given the increasing digitization and interconnectivity of industrial environments in Europe, exploitation of this vulnerability could have cascading effects on supply chains and critical services. The medium severity rating reflects the balance between the potential impact and the complexity of exploitation; however, the lack of authentication requirement and remote exploitability increase the threat level in operational contexts.

Mitigation Recommendations

1. Immediate implementation of network segmentation and strict access controls to isolate GX Works3 environments from untrusted networks, minimizing exposure to remote attackers. 2. Employ application whitelisting and endpoint protection solutions to detect and prevent unauthorized execution or modification of GX Works3-related files. 3. Monitor network traffic for unusual access patterns or attempts to interact with GX Works3 services, using industrial intrusion detection systems tailored for ICS environments. 4. Conduct thorough audits of project files and control logic to identify unauthorized changes or anomalies. 5. Engage with Mitsubishi Electric for updates or patches addressing this vulnerability and plan for timely deployment once available. 6. Where feasible, restrict the use of vulnerable versions by upgrading to newer, unaffected software releases or applying vendor-recommended workarounds. 7. Train operational technology (OT) personnel on the risks associated with hard-coded keys and the importance of secure key management practices. 8. Implement robust backup and recovery procedures for project files to enable rapid restoration in case of tampering or data loss.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2022-04-27T20:47:43.443Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf004a

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 2:52:41 PM

Last updated: 2/4/2026, 10:50:48 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats