CVE-2022-33315

7.8 HIGH

📋 TL;DR

This CVE describes a deserialization vulnerability in Mitsubishi Electric's GENESIS64, ICONICS Suite, and MC Works64 products. An unauthenticated attacker can execute arbitrary code by tricking a user into loading a malicious monitoring screen file containing XAML code. Affected organizations include industrial control system operators using these specific software versions.

💻 Affected Systems

Products:
  • Mitsubishi Electric GENESIS64
  • Mitsubishi Electric Iconics Digital Solutions GENESIS64
  • Mitsubishi Electric ICONICS Suite
  • Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
  • Mitsubishi Electric MC Works64
Versions: GENESIS64/ICONICS Suite: 10.97 to 10.97.1; MC Works64: 4.04E and prior
Operating Systems: Windows (typically used for these industrial software suites)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to load malicious monitoring screen files. Systems using these versions in default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the industrial control system, allowing attacker to manipulate processes, steal sensitive data, or cause physical damage to industrial equipment.

🟠

Likely Case

Remote code execution leading to data theft, lateral movement within the OT network, or disruption of monitoring capabilities.

🟢

If Mitigated

Limited impact if systems are air-gapped, have strict file loading policies, and users are trained to avoid untrusted files.

🌐 Internet-Facing: MEDIUM - While the exploit is unauthenticated, these systems are typically not directly internet-facing in industrial environments.
🏢 Internal Only: HIGH - These systems are commonly deployed in internal OT networks where the vulnerability could be exploited through phishing or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires user to load malicious file but no authentication needed for exploitation.

Exploitation requires social engineering to get users to load malicious monitoring screen files. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GENESIS64/ICONICS Suite: 10.97.2 or later; MC Works64: 4.05E or later

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Mitsubishi Electric's official website. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict file loading

all

Implement policies to prevent loading of untrusted monitoring screen files

User training

all

Train operators to only load monitoring screen files from trusted sources

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check software version in the application's About or Help menu. Compare against affected version ranges.

Check Version:

Check through the application's GUI interface (no standard CLI command available for these industrial applications)

Verify Fix Applied:

Verify the software version is updated to patched versions: GENESIS64/ICONICS Suite 10.97.2+ or MC Works64 4.05E+

📡 Detection & Monitoring

Log Indicators:

  • Unexpected monitoring screen file loads
  • Unusual process execution following file load
  • Error logs related to XAML parsing

Network Indicators:

  • Unusual outbound connections from the industrial software
  • File transfers to/from the monitoring system

SIEM Query:

Process creation events from the industrial software executables following file load operations

🔗 References

📤 Share & Export