CVE-2022-25159

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to login to the product by replay attack.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uc_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uc-32mr\/ds-ts_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mr\/ds-ts:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/d:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/dss_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/dss:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-24mr\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-24mr\/es:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-24mt\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-24mt\/es:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-24mt\/ess_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-24mt\/ess:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-40mr\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-40mr\/es:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-40mt\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-40mt\/es:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-40mt\/ess_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-40mt\/ess:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-60mr\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-60mr\/es:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-60mt\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-60mt\/es:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj-60mt\/ess_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-60mt\/ess:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/dss-ts_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/dss-ts:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/ds-ts_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/ds-ts:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:mitsubishielectric:fx5uj_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj:-:*:*:*:*:*:*:*

History

02 Jun 2022, 18:15

Type Values Removed Values Added
Summary Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions and Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions allows a remote unauthenticated attacker to login to the product by replay attack. Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to login to the product by replay attack.

08 Apr 2022, 14:29

Type Values Removed Values Added
CWE CWE-294
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.1
CPE cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/dss-ts:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-60mt\/es:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-24mt\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-40mt\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-40mt\/ess_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/d:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uc-32mr\/ds-ts_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-60mt\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-40mt\/es:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-24mt\/ess:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-60mt\/ess:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-24mt\/es:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/dss:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-40mt\/ess:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mr\/ds-ts:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uc-32mt\/ds-ts:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uc_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-60mt\/ess_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-40mr\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-60mr\/es:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-24mr\/es:-:*:*:*:*:*:*:*
cpe:2.3:h:mitsubishielectric:fx5uj-40mr\/es:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/dss-ts_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/dss_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-60mr\/es_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uc-32mt\/ds-ts_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-24mt\/ess_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:mitsubishielectric:fx5uj-24mr\/es_firmware:-:*:*:*:*:*:*:*
References (MISC) https://jvn.jp/vu/JVNVU96577897/index.html - (MISC) https://jvn.jp/vu/JVNVU96577897/index.html - Third Party Advisory
References (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04 - (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-04 - Third Party Advisory, US Government Resource
References (MISC) https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf - (MISC) https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-031_en.pdf - Vendor Advisory
First Time Mitsubishielectric fx5uj-24mt\/ess
Mitsubishielectric
Mitsubishielectric fx5uj-24mr\/es Firmware
Mitsubishielectric fx5uc-32mt\/dss Firmware
Mitsubishielectric fx5uc-32mt\/d
Mitsubishielectric fx5uc-32mt\/ds-ts Firmware
Mitsubishielectric fx5uj-60mt\/es Firmware
Mitsubishielectric fx5uc-32mt\/dss
Mitsubishielectric fx5uc Firmware
Mitsubishielectric fx5uc-32mt\/ds-ts
Mitsubishielectric fx5uj-40mt\/es
Mitsubishielectric fx5uj-24mt\/es
Mitsubishielectric fx5uc-32mt\/dss-ts
Mitsubishielectric fx5uj-60mt\/ess Firmware
Mitsubishielectric fx5uj-24mr\/es
Mitsubishielectric fx5uc-32mr\/ds-ts
Mitsubishielectric fx5uj-40mt\/es Firmware
Mitsubishielectric fx5uj-60mr\/es Firmware
Mitsubishielectric fx5uj-60mr\/es
Mitsubishielectric fx5uj-24mt\/ess Firmware
Mitsubishielectric fx5uj-60mt\/es
Mitsubishielectric fx5uj-60mt\/ess
Mitsubishielectric fx5uj-40mt\/ess
Mitsubishielectric fx5uj-24mt\/es Firmware
Mitsubishielectric fx5uc
Mitsubishielectric fx5uj-40mt\/ess Firmware
Mitsubishielectric fx5uj-40mr\/es Firmware
Mitsubishielectric fx5uc-32mr\/ds-ts Firmware
Mitsubishielectric fx5uj-40mr\/es
Mitsubishielectric fx5uj Firmware
Mitsubishielectric fx5uc-32mt\/d Firmware
Mitsubishielectric fx5uc-32mt\/dss-ts Firmware
Mitsubishielectric fx5uj

01 Apr 2022, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-01 23:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-25159

Mitre link : CVE-2022-25159

CVE.ORG link : CVE-2022-25159


JSON object : View

Products Affected

mitsubishielectric

  • fx5uj-40mt\/ess_firmware
  • fx5uj-40mr\/es
  • fx5uc-32mt\/dss-ts
  • fx5uj-40mt\/es_firmware
  • fx5uc-32mt\/d_firmware
  • fx5uj-40mt\/es
  • fx5uc-32mt\/dss-ts_firmware
  • fx5uj-60mt\/es
  • fx5uj-60mt\/es_firmware
  • fx5uj-24mt\/ess_firmware
  • fx5uj-24mt\/es
  • fx5uc-32mt\/dss_firmware
  • fx5uj-60mt\/ess_firmware
  • fx5uj-40mr\/es_firmware
  • fx5uj-60mt\/ess
  • fx5uc-32mr\/ds-ts
  • fx5uj-24mr\/es
  • fx5uj-60mr\/es_firmware
  • fx5uc-32mt\/ds-ts_firmware
  • fx5uj-40mt\/ess
  • fx5uc-32mr\/ds-ts_firmware
  • fx5uc-32mt\/d
  • fx5uj-24mt\/es_firmware
  • fx5uj-60mr\/es
  • fx5uc-32mt\/ds-ts
  • fx5uc
  • fx5uj-24mr\/es_firmware
  • fx5uj
  • fx5uj-24mt\/ess
  • fx5uj_firmware
  • fx5uc-32mt\/dss
  • fx5uc_firmware
CWE
CWE-294

Authentication Bypass by Capture-replay