Assigner | Mitsubishi |
Reserved | 2022-06-14 |
Published | 2022-12-23 |
Updated | 2024-09-05 |
Description
Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions "32" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "65" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions "29" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120PSFCPU Firmware versions "08" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions "17" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU Firmware versions "05" and prior and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions "07" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery.
HIGH: 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Problem types
CWE-404 Improper Resource Shutdown or Release
Product status
Default status
0x40029f1880
Firmware versions "32" and prior
affected
Default status
0x40029f18b0
Firmware versions "32" and prior
affected
Default status
0x40029f18e0
Firmware versions "32" and prior
affected
Default status
0x40029f1910
Firmware versions "65" and prior
affected
Default status
0x40029f1940
Firmware versions "65" and prior
affected
Default status
0x40029f1970
Firmware versions "65" and prior
affected
Default status
0x40029f19a0
Firmware versions "65" and prior
affected
Default status
0x40029f19d0
Firmware versions "65" and prior
affected
Default status
0x40029f1a00
Firmware versions "65" and prior
affected
Default status
0x40029f1a30
Firmware versions "65" and prior
affected
Default status
0x40029f1a60
Firmware versions "65" and prior
affected
Default status
0x40029f1a90
Firmware versions "65" and prior
affected
Default status
0x40029f1ac0
Firmware versions "65" and prior
affected
Default status
0x40029f1af0
Firmware versions "29" and prior
affected
Default status
0x40029f1b20
Firmware versions "29" and prior
affected
Default status
0x40029f1b50
Firmware versions "29" and prior
affected
Default status
0x40029f1b80
Firmware versions "29" and prior
affected
Default status
0x40029f1bb0
Firmware versions "17" and prior
affected
Default status
0x40029f1be0
Firmware versions "05" and prior
affected
Default status
0x40029f1c10
Firmware versions "05" and prior
affected
Default status
0x40029f1c40
Firmware versions "05" and prior
affected
Default status
0x40029f1c70
Firmware versions "05" and prior
affected
Default status
0x40029f1ca0
Firmware versions "07" and prior
affected
Default status
0x40029f1cd0
Firmware versions "08" and prior
affected
Default status
0x40029f1d00
Firmware versions "08" and prior
affected
Default status
0x40029f1d30
Firmware versions "08" and prior
affected
Default status
0x40029f1d60
Firmware versions "08" and prior
affected
References
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-018_en.pdf vendor-advisory
https://jvn.jp/vu/JVNVU96883262 government-resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-356-03 government-resource
cve.org CVE-2022-33324
nvd.nist.gov CVE-2022-33324
Download JSON
Share this page
https://cve.threatint.com/CVE/CVE-2022-33324
Subscribe to our newsletter to learn more about our work.