{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric","versions":[{"status":"affected","version":"Versions 10.97 to 10.97.1"}]},{"defaultStatus":"unaffected","product":"GENESIS64","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"Versions 10.97 to 10.97.1"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric","versions":[{"status":"affected","version":"Versions 10.97 to 10.97.1"}]},{"defaultStatus":"unaffected","product":"ICONICS Suite","vendor":"Mitsubishi Electric Iconics Digital Solutions","versions":[{"status":"affected","version":"Versions 10.97 to 10.97.1"}]},{"defaultStatus":"unaffected","product":"MC Works64","vendor":"Mitsubishi Electric","versions":[{"status":"affected","version":"Versions 4.04E and prior"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes."}],"value":"Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","shortName":"Mitsubishi","dateUpdated":"2026-01-09T05:16:27.798Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf"},{"tags":["government-resource"],"url":"https://jvn.jp/vu/JVNVU96480474/index.html"},{"tags":["government-resource"],"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.5.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","ID":"CVE-2022-33320","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ICONICS GENESIS64; Mitsubishi Electric MC Works64","version":{"version_data":[{"version_value":"ICONICS GENESIS64 versions 10.97.1 and prior"},{"version_value":"Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Deserialization of Untrusted Data"}]}]},"references":{"reference_data":[{"name":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","refsource":"MISC","url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf"},{"name":"https://jvn.jp/vu/JVNVU96480474/index.html","refsource":"MISC","url":"https://jvn.jp/vu/JVNVU96480474/index.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T08:09:21.319Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://jvn.jp/vu/JVNVU96480474/index.html"}]}]},"cveMetadata":{"assignerOrgId":"e0f77b61-78fd-4786-b3fb-1ee347a748ad","assignerShortName":"Mitsubishi","cveId":"CVE-2022-33320","datePublished":"2022-07-20T16:56:24.000Z","dateReserved":"2022-06-14T00:00:00.000Z","dateUpdated":"2026-01-09T05:16:27.798Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}