CVE-2022-33315
📋 TL;DR
This CVE describes a deserialization vulnerability in Mitsubishi Electric's GENESIS64, ICONICS Suite, and MC Works64 products. An unauthenticated attacker can execute arbitrary code by tricking a user into loading a malicious monitoring screen file containing XAML code. Affected organizations include industrial control system operators using these specific software versions.
💻 Affected Systems
- Mitsubishi Electric GENESIS64
- Mitsubishi Electric Iconics Digital Solutions GENESIS64
- Mitsubishi Electric ICONICS Suite
- Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
- Mitsubishi Electric MC Works64
📦 What is this software?
Genesis64 by Iconics
Genesis64 by Iconics
Mc Works64 by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the industrial control system, allowing attacker to manipulate processes, steal sensitive data, or cause physical damage to industrial equipment.
Likely Case
Remote code execution leading to data theft, lateral movement within the OT network, or disruption of monitoring capabilities.
If Mitigated
Limited impact if systems are air-gapped, have strict file loading policies, and users are trained to avoid untrusted files.
🎯 Exploit Status
Exploitation requires social engineering to get users to load malicious monitoring screen files. No public exploit code has been disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: GENESIS64/ICONICS Suite: 10.97.2 or later; MC Works64: 4.05E or later
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf
Restart Required: Yes
Instructions:
1. Download the latest version from Mitsubishi Electric's official website. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.
🔧 Temporary Workarounds
Restrict file loading
allImplement policies to prevent loading of untrusted monitoring screen files
User training
allTrain operators to only load monitoring screen files from trusted sources
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected systems from untrusted networks
- Deploy application whitelisting to prevent execution of unauthorized code
🔍 How to Verify
Check if Vulnerable:
Check software version in the application's About or Help menu. Compare against affected version ranges.
Check Version:
Check through the application's GUI interface (no standard CLI command available for these industrial applications)
Verify Fix Applied:
Verify the software version is updated to patched versions: GENESIS64/ICONICS Suite 10.97.2+ or MC Works64 4.05E+
📡 Detection & Monitoring
Log Indicators:
- Unexpected monitoring screen file loads
- Unusual process execution following file load
- Error logs related to XAML parsing
Network Indicators:
- Unusual outbound connections from the industrial software
- File transfers to/from the monitoring system
SIEM Query:
Process creation events from the industrial software executables following file load operations
🔗 References
- https://jvn.jp/vu/JVNVU96480474/index.html
- https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf
- https://jvn.jp/vu/JVNVU96480474/index.html
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf