cve-2022-29518
Vulnerability from cvelistv5
Published
2022-05-18 09:50
Modified
2024-08-03 06:26
Severity ?
EPSS score ?
Summary
Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting's account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN50337155/index.html | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.koyoele.co.jp/en/topics/202205095016/ | Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:26:06.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.koyoele.co.jp/en/topics/202205095016/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN50337155/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool", "vendor": "KOYO ELECTRONICS INDUSTRIES CO., LTD.", "versions": [ { "status": "affected", "version": "Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC)" } ] } ], "descriptions": [ { "lang": "en", "value": "Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting\u0027s account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI." } ], "problemTypes": [ { "descriptions": [ { "description": "Reliance on Untrusted Inputs in a Security Decision", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-18T09:50:26", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.koyoele.co.jp/en/topics/202205095016/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN50337155/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-29518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool", "version": { "version_data": [ { "version_value": "Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC)" } ] } } ] }, "vendor_name": "KOYO ELECTRONICS INDUSTRIES CO., LTD." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting\u0027s account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reliance on Untrusted Inputs in a Security Decision" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.koyoele.co.jp/en/topics/202205095016/", "refsource": "MISC", "url": "https://www.koyoele.co.jp/en/topics/202205095016/" }, { "name": "https://jvn.jp/en/jp/JVN50337155/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN50337155/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-29518", "datePublished": "2022-05-18T09:50:26", "dateReserved": "2022-04-28T00:00:00", "dateUpdated": "2024-08-03T06:26:06.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-29518\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2022-05-18T15:15:10.197\",\"lastModified\":\"2023-08-08T14:21:49.707\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Screen Creator Advance2, HMI GC-A2 series, and Real time remote monitoring and control tool Screen Creator Advance2 versions prior to Ver.0.1.1.3 Build01, HMI GC-A2 series(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, and GC-A26-J2), and Real time remote monitoring and control tool(Remote GC) allows a local attacker to bypass authentication due to the improper check for the Remote control setting\u0027s account names. This may allow attacker who can access the HMI from Real time remote monitoring and control tool may perform arbitrary operations on the HMI. As a result, the information stored in the HMI may be disclosed, deleted or altered, and/or the equipment may be illegally operated via the HMI.\"},{\"lang\":\"es\",\"value\":\"Screen Creator Advance2, la serie HMI GC-A2 y la herramienta de control y supervisi\u00f3n remota en tiempo real Screen Creator Advance2 versiones anteriores a 0.1.1.3 Build01, la serie HMI GC-A2(GC-A22W-CW, GC-A24W-C(W), GC-A26W-C(W), GC-A24, GC-A24-M, GC-A25, GC-A26, y GC-A26-J2), y la herramienta de monitorizaci\u00f3n y control remoto en tiempo real(Remote GC) permiten a un atacante local omitir la autenticaci\u00f3n debido a la comprobaci\u00f3n inapropiada de los nombres de cuenta de la configuraci\u00f3n del control remoto. Esto puede permitir que un atacante que pueda acceder a la HMI desde la herramienta de control y supervisi\u00f3n remota en tiempo real pueda llevar a cabo operaciones arbitrarias en la HMI. Como resultado, la informaci\u00f3n almacenada en la HMI puede ser divulgada, borrada o alterada, y/o el equipo puede ser operado ilegalmente por medio de la HMI\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":5.9},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":8.5,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:koyoele:remote_gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEEDB09-DD08-4D4D-A871-5433CCB006E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:koyoele:screen_creator_advance_2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.1.1.3\",\"matchCriteriaId\":\"E41BFAAF-013C-4589-A4F2-0A1ACC83270A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:koyoele:screen_creator_advance_2:0.1.1.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"291960FA-0E6B-4C57-9E72-72E9D2513F0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a22w-cw_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73132A23-944B-44E7-8CBC-3E2568A09E90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a22w-cw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8801FA1-7E64-4F3D-A880-0A4EF1E2430B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a24_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7F5CE2-5E5F-43D1-81CF-B5FF1DBE1BF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a24:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D87A3961-911C-4129-B862-4D34FC9B6529\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a24-m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86448090-25C3-4A55-8C02-8A8535D3BA02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a24-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD34EC9-A610-4B80-9377-376DDD6A025D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a24w-c\\\\(w\\\\)_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB632FAD-4CAB-4A0C-B8EB-3058927586C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a24w-c\\\\(w\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D957FF-4FE8-4B6E-9DA3-7B193EBB7DAE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a25_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3162BFE-1336-4CFD-8A46-4E30617B8D96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a25:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C1FD63-16F6-4A3C-865F-5B62FCC142C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a26_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4AD1839-B384-4C9B-ADEC-4C7041129DFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a26:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78BFA01-EC77-488B-9E14-DD4882D28F99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a26-j2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CDEADF7-E57C-4030-AF2E-00CE803D5265\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a26-j2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9C691F-6048-413A-A2E1-23D5BEE75747\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:koyoele:gc-a26w-c\\\\(w\\\\)_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCC0778-8822-481C-98D7-CDD45ACA8540\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:koyoele:gc-a26w-c\\\\(w\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FB93D0-C266-4891-823A-2AFA5EF0FD80\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN50337155/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.koyoele.co.jp/en/topics/202205095016/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.