{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T23:20:02.076","vulnerabilities":[{"cve":{"id":"CVE-2022-29829","sourceIdentifier":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published":"2022-11-25T00:15:10.297","lastModified":"2025-11-07T07:15:33.160","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C, Motion Control Setting(GX Works3 related software) versions from 1.035M to 1.042U, and MT Works2 versions from 1.100E to 1.200J allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally."},{"lang":"es","value":"Uso de vulnerabilidad de clave criptográfica codificada en Mitsubishi Electric GX Works3 las versiones desde 1.000A hasta 1.090U, GT Designer3 Versión1 (GOT2000) desde 1.122C hasta 1.290C y Motion Control Setting (software relacionado con GX Works3) desde 1.035M hasta 1.042U \npermite que un atacante remoto no autenticado revele información sensible. Como resultado, los usuarios no autenticados pueden ver programas y archivos de proyectos o ejecutar programas ilegalmente."}],"metrics":{"cvssMetricV31":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-321"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*","versionStartIncluding":"1.000a","versionEndIncluding":"1.011m","matchCriteriaId":"A868567B-2BAA-45AE-AEC9-3AFEF2361297"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*","versionStartIncluding":"1.015r","versionEndIncluding":"1.086q","matchCriteriaId":"56BD062B-0D41-42E2-B9EF-B7FBB514CFF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitsubishielectric:gx_works3:*:*:*:*:*:*:*:*","versionStartIncluding":"1.087r","matchCriteriaId":"C7C6A654-1B83-4743-8DDE-B8C5AA5C4D2A"}]}]}],"references":[{"url":"https://jvn.jp/vu/JVNVU97244961/index.html","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":["Mitigation","Vendor Advisory"]},{"url":"https://jvn.jp/vu/JVNVU97244961/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-05","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}