Skip to main content

CVE-2022-33321: CWE-319 Cleartext Transmission of Sensitive Information in Mitsubishi Electric Corporation PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-M

Critical
VulnerabilityCVE-2022-33321cvecve-2022-33321cwe-319
Published: Tue Nov 08 2022 (11/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Mitsubishi Electric Corporation
Product: PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-M

Description

Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

AI-Powered Analysis

AILast updated: 07/02/2025, 01:24:30 UTC

Technical Analysis

CVE-2022-33321 is a critical vulnerability affecting a broad range of Mitsubishi Electric consumer electronics products, including the PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-M and numerous other devices such as HEMS adapters, Wi-Fi interfaces, air conditioning units, induction hobs, refrigerators, and various smart home appliances. The root cause of this vulnerability is the use of Basic Authentication over HTTP connections, which transmits sensitive credential information (usernames and passwords) in cleartext. This lack of encryption allows a remote, unauthenticated attacker to intercept network traffic and capture these credentials through simple network sniffing techniques. Once credentials are compromised, attackers can potentially access the affected devices, leading to unauthorized disclosure of sensitive information or causing denial of service (DoS) conditions by disrupting device operations. The vulnerability affects all versions of the impacted products, indicating a systemic design flaw in the authentication mechanism. The CVSS v3.1 base score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with ease of exploitation (no privileges or user interaction required) and network attack vector. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk due to the widespread deployment of these devices in consumer and industrial environments. The CWE-319 classification highlights the core issue of cleartext transmission of sensitive information, which is a fundamental security weakness that undermines trust in the affected devices' communication channels.

Potential Impact

For European organizations, especially those involved in energy management, smart home automation, and industrial control systems, this vulnerability presents a substantial risk. Many European countries have adopted smart energy solutions and IoT devices for efficiency and sustainability goals, often deploying Mitsubishi Electric products in residential, commercial, and industrial settings. The interception of credentials could lead to unauthorized control or disruption of critical energy monitoring and management systems, potentially causing operational downtime, inaccurate energy reporting, or even physical damage to connected infrastructure. Confidentiality breaches could expose user data and operational parameters, leading to privacy violations and regulatory non-compliance under GDPR. The DoS potential further threatens service availability, which could impact business continuity and safety systems reliant on these devices. Given the critical CVSS rating, the vulnerability could be exploited by cybercriminals or nation-state actors targeting European energy grids, smart buildings, or manufacturing facilities, amplifying the threat landscape for the region.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately assess their deployment of Mitsubishi Electric consumer electronics and identify affected devices. Specific mitigation steps include: 1) Applying any available firmware updates or patches from Mitsubishi Electric that replace Basic Authentication with secure authentication mechanisms such as OAuth or token-based authentication over HTTPS. 2) If patches are unavailable, implement network-level protections such as segmenting affected devices into isolated VLANs to limit exposure and deploying network intrusion detection systems (NIDS) to monitor suspicious traffic. 3) Enforce the use of VPNs or secure tunnels (e.g., IPsec) for remote access to these devices to ensure encrypted communication channels. 4) Replace HTTP with HTTPS by configuring devices or network proxies to enforce TLS encryption, preventing credential interception. 5) Regularly audit device configurations and network traffic to detect unauthorized access attempts. 6) Educate staff on the risks of using default or weak credentials and enforce strong password policies. 7) Engage with Mitsubishi Electric support to obtain guidance and track advisories for future updates. These targeted actions go beyond generic advice by focusing on network architecture adjustments and secure communication enforcement tailored to the affected product ecosystem.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mitsubishi
Date Reserved
2022-06-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbec710

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 1:24:30 AM

Last updated: 7/30/2025, 6:31:07 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats