CVE-2022-29518

Description

Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting's account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI.

7.0
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.03%
Vendor Advisory co.jp
Affected: KOYO ELECTRONICS INDUSTRIES CO., LTD. Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-29518?
CVE-2022-29518 has been scored as a high severity vulnerability.
How to fix CVE-2022-29518?
To fix CVE-2022-29518, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-29518 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-29518 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-29518?
CVE-2022-29518 affects KOYO ELECTRONICS INDUSTRIES CO., LTD. Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.