Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://jvn.jp/vu/JVNVU95403720/index.html | vdb entry third party advisory mitigation |
https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | us government resource mitigation vdb entry third party advisory |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf | mitigation vendor advisory |