📦 Mc Works64

by Mitsubishielectric

🔍 What is Mc Works64?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2023-6943

CRITICAL CVSS 9.8 Jan 30, 2024

This vulnerability allows remote unauthenticated attackers to execute arbitrary code on affected Mitsubishi Electric industrial control software by exploiting unsafe reflection in RPC communications. ...

CVE-2022-33318

CRITICAL CVSS 9.8 Jul 20, 2022

This CVE describes a critical deserialization vulnerability in multiple Mitsubishi Electric industrial control software products. Remote unauthenticated attackers can execute arbitrary malicious code ...

CVE-2022-23128

CRITICAL CVSS 9.8 Jan 21, 2022

This vulnerability allows remote unauthenticated attackers to bypass authentication in multiple Mitsubishi Electric and ICONICS industrial software products by sending specially crafted WebSocket pack...

CVE-2023-6942

HIGH CVSS 7.5 Jan 30, 2024

This vulnerability allows remote unauthenticated attackers to bypass authentication in multiple Mitsubishi Electric industrial software products by sending specially crafted packets. Affected systems ...

CVE-2022-33315

HIGH CVSS 7.8 Jul 20, 2022

This CVE describes a deserialization vulnerability in Mitsubishi Electric's GENESIS64, ICONICS Suite, and MC Works64 products. An unauthenticated attacker can execute arbitrary code by tricking a user...

CVE-2022-33317

HIGH CVSS 7.8 Jul 20, 2022

This vulnerability allows unauthenticated attackers to execute arbitrary malicious code by tricking users into loading specially crafted monitoring screen files containing malicious scripts. It affect...

CVE-2022-33320

HIGH CVSS 7.8 Jul 20, 2022

This CVE describes a deserialization vulnerability in Mitsubishi Electric's GENESIS64, ICONICS Suite, and MC Works64 software. An unauthenticated attacker can execute arbitrary code by tricking a user...