CVE-2022-33317

7.8 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary malicious code by tricking users into loading specially crafted monitoring screen files containing malicious scripts. It affects multiple Mitsubishi Electric industrial control system software products, specifically GENESIS64, ICONICS Suite, and MC Works64. Attackers can achieve remote code execution without authentication.

💻 Affected Systems

Products:
  • Mitsubishi Electric GENESIS64
  • Mitsubishi Electric Iconics Digital Solutions GENESIS64
  • Mitsubishi Electric ICONICS Suite
  • Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
  • Mitsubishi Electric MC Works64
Versions: GENESIS64: 10.97 to 10.97.1; ICONICS Suite: 10.97 to 10.97.1; MC Works64: 4.04E and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the monitoring screen file parsing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to operational disruption, data theft, or physical damage to industrial processes.

🟠

Likely Case

Attackers gain initial foothold in industrial networks, deploy ransomware, steal sensitive operational data, or pivot to other critical systems.

🟢

If Mitigated

Limited impact due to network segmentation and proper access controls preventing exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to deliver malicious monitoring screen files, but the technical execution is straightforward once the file is loaded.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GENESIS64/ICONICS Suite: 10.97.2 or later; MC Works64: 4.05E or later

Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf

Restart Required: Yes

Instructions:

1. Download the updated version from Mitsubishi Electric support portal. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict monitoring screen file sources

all

Only allow loading of monitoring screen files from trusted, verified sources. Implement strict file validation and user education.

Network segmentation and access controls

all

Isolate affected systems in separate network segments with strict firewall rules limiting inbound connections.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized scripts and binaries.
  • Deploy network monitoring and intrusion detection systems to detect exploitation attempts and malicious file transfers.

🔍 How to Verify

Check if Vulnerable:

Check the software version in the application's About or Help menu, or review installation logs and registry entries for version information.

Check Version:

Check Windows Programs and Features or application interface for version details.

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions: GENESIS64/ICONICS Suite ≥10.97.2, MC Works64 ≥4.05E.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected monitoring screen file loads
  • Script execution errors
  • Unusual process creation events

Network Indicators:

  • Suspicious file transfers to affected systems
  • Unexpected network connections from ICS software

SIEM Query:

Process creation where parent process contains 'GENESIS64' or 'MCWorks64' and command line contains script execution patterns

🔗 References

📤 Share & Export