{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T01:25:21.915","vulnerabilities":[{"cve":{"id":"CVE-2022-29834","sourceIdentifier":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","published":"2022-07-20T17:15:08.043","lastModified":"2026-01-09T05:15:49.313","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server or ICONICS suite server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 or ICONICS Suite mobile monitoring application and accessing the monitoring screen."},{"lang":"es","value":"La vulnerabilidad de Limitación Inapropiada de un Nombre de Ruta a un Directorio Restringido (\"Salto de Ruta\") en ICONICS GENESIS64 versiones 10.97 a 10.97.1, permite a un atacante remoto no autenticado acceder a archivos arbitrarios en el servidor de GENESIS64 y divulgar información almacenada en los archivos al insertar un parámetro de URL malicioso en la URL de la pantalla de monitorización entregada a la aplicación de monitorización móvil GENESIS64 y acceder a la pantalla de monitorización"}],"metrics":{"cvssMetricV31":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*","matchCriteriaId":"44D3F652-C916-4395-BD11-AECDDF960D45"},{"vulnerable":true,"criteria":"cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*","matchCriteriaId":"6D89798E-910C-4C3F-9385-D9B7CA921091"}]}]}],"references":[{"url":"https://jvn.jp/vu/JVNVU96480474/index.html","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","source":"Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp","tags":["Third Party Advisory"]},{"url":"https://jvn.jp/vu/JVNVU96480474/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}