CVE-2022-33320
📋 TL;DR
This CVE describes a deserialization vulnerability in Mitsubishi Electric's GENESIS64, ICONICS Suite, and MC Works64 software. An unauthenticated attacker can execute arbitrary code by tricking a user into loading a malicious project configuration file. Affected organizations include industrial control system operators using these specific versions.
💻 Affected Systems
- Mitsubishi Electric GENESIS64
- Mitsubishi Electric Iconics Digital Solutions GENESIS64
- Mitsubishi Electric ICONICS Suite
- Mitsubishi Electric Iconics Digital Solutions ICONICS Suite
- Mitsubishi Electric MC Works64
📦 What is this software?
Genesis64 by Iconics
Genesis64 by Iconics
Mc Works64 by Mitsubishielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary code with system privileges, potentially leading to operational disruption, data theft, or lateral movement within industrial networks.
Likely Case
Remote code execution on affected systems, enabling attackers to install malware, steal credentials, or disrupt industrial processes.
If Mitigated
Limited impact if proper network segmentation, least privilege, and file validation controls are implemented.
🎯 Exploit Status
Exploitation requires social engineering to get user to load malicious file; no public exploit code available at time of advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: GENESIS64/ICONICS Suite: version 10.97.2 or later; MC Works64: version 4.04F or later
Vendor Advisory: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf
Restart Required: Yes
Instructions:
1. Download updated versions from Mitsubishi Electric support portal. 2. Backup current configuration and data. 3. Install the updated software. 4. Restart affected systems. 5. Verify functionality.
🔧 Temporary Workarounds
Restrict project file loading
allImplement policies to only load project files from trusted sources and validate file integrity before loading.
Network segmentation
allIsolate affected systems from untrusted networks and implement strict firewall rules.
🧯 If You Can't Patch
- Implement strict user training about loading only trusted project files
- Deploy application whitelisting to prevent execution of unauthorized code
🔍 How to Verify
Check if Vulnerable:
Check software version in application about dialog or installation directory; compare against affected versions list.
Check Version:
Check Help > About in application interface or examine installed programs in Windows Control Panel.
Verify Fix Applied:
Verify installed version is 10.97.2 or later for GENESIS64/ICONICS Suite, or 4.04F or later for MC Works64.
📡 Detection & Monitoring
Log Indicators:
- Unexpected process creation from GENESIS64/ICONICS/MC Works64 processes
- Loading of project files from unusual locations
- XML parsing errors in application logs
Network Indicators:
- Unusual outbound connections from affected systems
- File transfers to/from industrial control systems
SIEM Query:
Process creation where parent process contains 'GENESIS64' OR 'ICONICS' OR 'MCWorks64' AND (command line contains suspicious patterns OR destination IP is external)
🔗 References
- https://jvn.jp/vu/JVNVU96480474/index.html
- https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf
- https://jvn.jp/vu/JVNVU96480474/index.html
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf