We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-33324

Denial-of-Service Vulnerability in Ethernet port of MELSEC iQ-R, iQ-L Series and MELIPC Series



AssignerMitsubishi
Reserved2022-06-14
Published2022-12-23
Updated2024-09-05

Description

Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions "32" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "65" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions "29" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120PSFCPU Firmware versions "08" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions "17" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU Firmware versions "05" and prior and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions "07" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-404 Improper Resource Shutdown or Release

Product status

Default status
0x40029f1880

Firmware versions "32" and prior
affected

Default status
0x40029f18b0

Firmware versions "32" and prior
affected

Default status
0x40029f18e0

Firmware versions "32" and prior
affected

Default status
0x40029f1910

Firmware versions "65" and prior
affected

Default status
0x40029f1940

Firmware versions "65" and prior
affected

Default status
0x40029f1970

Firmware versions "65" and prior
affected

Default status
0x40029f19a0

Firmware versions "65" and prior
affected

Default status
0x40029f19d0

Firmware versions "65" and prior
affected

Default status
0x40029f1a00

Firmware versions "65" and prior
affected

Default status
0x40029f1a30

Firmware versions "65" and prior
affected

Default status
0x40029f1a60

Firmware versions "65" and prior
affected

Default status
0x40029f1a90

Firmware versions "65" and prior
affected

Default status
0x40029f1ac0

Firmware versions "65" and prior
affected

Default status
0x40029f1af0

Firmware versions "29" and prior
affected

Default status
0x40029f1b20

Firmware versions "29" and prior
affected

Default status
0x40029f1b50

Firmware versions "29" and prior
affected

Default status
0x40029f1b80

Firmware versions "29" and prior
affected

Default status
0x40029f1bb0

Firmware versions "17" and prior
affected

Default status
0x40029f1be0

Firmware versions "05" and prior
affected

Default status
0x40029f1c10

Firmware versions "05" and prior
affected

Default status
0x40029f1c40

Firmware versions "05" and prior
affected

Default status
0x40029f1c70

Firmware versions "05" and prior
affected

Default status
0x40029f1ca0

Firmware versions "07" and prior
affected

Default status
0x40029f1cd0

Firmware versions "08" and prior
affected

Default status
0x40029f1d00

Firmware versions "08" and prior
affected

Default status
0x40029f1d30

Firmware versions "08" and prior
affected

Default status
0x40029f1d60

Firmware versions "08" and prior
affected

References

https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-018_en.pdf vendor-advisory

https://jvn.jp/vu/JVNVU96883262 government-resource

https://www.cisa.gov/uscert/ics/advisories/icsa-22-356-03 government-resource

cve.org CVE-2022-33324

nvd.nist.gov CVE-2022-33324

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-33324
Subscribe to our newsletter to learn more about our work.