Description
Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DSS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versions 1.042 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versions 1.043 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versions 1.003 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versions 33 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versions 66 and prior allows a remote unauthenticated attacker to access the Web server function by guessing the random numbers used for authentication from several used random numbers.
Published: 2023-01-20
Score: 5.9 Medium
EPSS: 2.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-43565 Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DSS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versions 1.042 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versions 1.043 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versions 1.003 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versions 33 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versions 66 and prior allows a remote unauthenticated attacker to access the Web server function by guessing the random numbers used for authentication from several used random numbers.
History

No history.

Subscriptions

Mitsubishielectric Fx5s-30mr\/es Fx5s-30mr\/es Firmware Fx5s-30mt\/es Fx5s-30mt\/es Firmware Fx5s-30mt\/ess Fx5s-30mt\/ess Firmware Fx5s-40mr\/es Fx5s-40mr\/es Firmware Fx5s-40mt\/es Fx5s-40mt\/es Firmware Fx5s-40mt\/ess Fx5s-40mt\/ess Firmware Fx5s-60mr\/es Fx5s-60mr\/es Firmware Fx5s-60mt\/es Fx5s-60mt\/es Firmware Fx5s-60mt\/ess Fx5s-60mt\/ess Firmware Fx5s-80mr\/es Fx5s-80mr\/es Firmware Fx5s-80mt\/es Fx5s-80mt\/es Firmware Fx5s-80mt\/ess Fx5s-80mt\/ess Firmware Fx5u-32mt\/dss Fx5u-32mt\/dss Firmware Fx5u-64mt\/dss Fx5u-64mt\/dss Firmware Fx5u-80mt\/dss Fx5u-80mt\/dss Firmware Fx5u-80mt\/ess Fx5u-80mt\/ess Firmware Fx5uc-32mr\/ds-ts Fx5uc-32mr\/ds-ts Firmware Fx5uc-32mt\/d Fx5uc-32mt\/d Firmware Fx5uc-32mt\/ds-ts Fx5uc-32mt\/ds-ts Firmware Fx5uc-32mt\/dss Fx5uc-32mt\/dss-ts Fx5uc-32mt\/dss-ts Firmware Fx5uc-32mt\/dss Firmware Fx5uc-64mt\/d Fx5uc-64mt\/d Firmware Fx5uc-64mt\/dss Fx5uc-64mt\/dss Firmware Fx5uc-96mt\/d Fx5uc-96mt\/d Firmware Fx5uc-96mt\/dss Fx5uc-96mt\/dss Firmware Fx5uj-24mr\/es Fx5uj-24mr\/es-a Fx5uj-24mr\/es-a Firmware Fx5uj-24mr\/es Firmware Fx5uj-24mt\/es Fx5uj-24mt\/es-a Fx5uj-24mt\/es-a Firmware Fx5uj-24mt\/es Firmware Fx5uj-24mt\/ess Fx5uj-24mt\/ess Firmware Fx5uj-40mr\/es Fx5uj-40mr\/es-a Fx5uj-40mr\/es-a Firmware Fx5uj-40mr\/es Firmware Fx5uj-40mt\/es Fx5uj-40mt\/es-a Fx5uj-40mt\/es-a Firmware Fx5uj-40mt\/es Firmware Fx5uj-40mt\/ess Fx5uj-40mt\/ess Firmware Fx5uj-60mr\/es Fx5uj-60mr\/es-a Fx5uj-60mr\/es-a Firmware Fx5uj-60mr\/es Firmware Fx5uj-60mt\/es Fx5uj-60mt\/es-a Fx5uj-60mt\/es-a Firmware Fx5uj-60mt\/es Firmware Fx5uj-60mt\/ess Fx5uj-60mt\/ess Firmware R00cpu R00cpu Firmware R01cpu R01cpu Firmware R02cpu R02cpu Firmware R04cpu R04cpu Firmware R04encpu R04encpu Firmware R08cpu R08cpu Firmware R08encpu R08encpu Firmware R120cpu R120cpu Firmware R120encpu R120encpu Firmware R16cpu R16cpu Firmware R16encpu R16encpu Firmware R32cpu R32cpu Firmware R32encpu R32encpu Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: Mitsubishi

Published:

Updated: 2024-08-03T12:14:39.972Z

Reserved: 2022-09-08T19:40:16.931Z

Link: CVE-2022-40267

cve-icon Vulnrichment

Updated: 2024-08-03T12:14:39.972Z

cve-icon NVD

Status : Modified

Published: 2023-01-20T08:15:11.373

Modified: 2024-11-21T07:21:09.770

Link: CVE-2022-40267

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses