• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – RedLine Stealer – Active IOCs
April 4, 2022
Rewterz Threat Alert – IcedID banking Trojan – Active IOCs
April 4, 2022

Rewterz Threat Alert – ICS: Mitsubishi Electric FA Products Vulnerabilities

April 4, 2022

Severity

Medium

Analysis Summary

CVE-2022-25156 CVSS:5.9

Mitsubishi Electric FA Products could allow a remote attacker to bypass security restrictions, caused by the use of weak hash. By using a password reversed from an eavesdropped password hash, an attacker could exploit this vulnerability to log in to the product.

CVE-2022-25157 CVSS:7.4

Mitsubishi Electric FA Products could allow a remote attacker to bypass security restrictions, caused by the use of password hash instead of password for authentication. By using an eavesdropped password hash, an attacker could exploit this vulnerability to disclose or tamper with the information in the product.

CVE-2022-25158 CVSS:7.4

Mitsubishi Electric FA Products could allow a remote attacker to obtain sensitive information, caused by a cleartext storage of sensitive information. By gaining access to a specific file, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.

CVE-2022-25159 CVSS:5.9

Mitsubishi Electric FA Products could allow a remote attacker to launch a replay attack. An attacker could exploit this vulnerability to conduct a replay attack and gain unauthorized access to the device.

CVE-2022-25160 CVSS:6.8

Mitsubishi Electric FA Products could allow a remote attacker to obtain sensitive information, caused by a cleartext storage of sensitive information. By gaining access to a specific file, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.

CVE-2022-25155 CVSS:5.9

Mitsubishi Electric FA Products could allow a remote attacker to bypass security restrictions, caused by the use of password hash instead of password for authentication. By replaying an eavesdropped password hash, an attacker could exploit this vulnerability to log in to the product.

Impact

  • Security Bypass
  • Information Disclosure

Indicator Of Compromise

CVE

  • CVE-2022-25156
  • CVE-2022-25157
  • CVE-2022-25158
  • CVE-2022-25159
  • CVE-2022-25160

Affected Vendors

  • Mitsubishi Electric

Affected Products

  • Mitsubishi Electric MELSEC iQ-F Series FX5U(C) CPU modules
  • Mitsubishi Electric MELSEC iQ-F Series FX5UJ CPU module

Remediation

Refer to Mitsubishi Electric Web site for patch, upgrade or suggested workaround information.

Mitsubishi Electric Web site

  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.