Unknown
CVE-2022-33322
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-33322
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user’s browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric’s advisory which is listed in [References] section.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- ma-ew85s-e firmware,
- ma-ew85s-uk firmware,
- mac-507if-e firmware,
- mac-587if-e firmware,
- mac-587if2-e firmware,
- mac-588if-e firmware,
- mfz-gxt50/60/73vfk firmware,
- mfz-xt50/60vfk firmware,
- msxy-fp05/07/10/13/18/20/24vgk-sg1 firmware,
- msy-gp10/13/15/18/20/24vfk-sg1 firmware,
- msz-ap15/20/25/35/42/50/60/71vgk-e2 firmware,
- msz-ap15/20/25/35/42/50/60/71vgk-er2 firmware,
- msz-ap15/20/25/35/42/50/60/71vgk-et2 firmware,
- msz-ap22/25/35/42/50/60/71/80vgkd-a2 firmware,
- msz-ap22/25/35/42/50/61/70/80vgkd-a1 firmware,
- msz-ap25/35/42/50/60/71vgk-e3 firmware,
- msz-ap25/35/42/50/60/71vgk-er3 firmware,
- msz-ap25/35/42/50/60/71vgk-et3 firmware,
- msz-ap25/35/42/50vgk-e1 firmware,
- msz-ap25/35/42/50vgk-e7 firmware,
- msz-ap25/35/42/50vgk-e8 firmware,
- msz-ap25/35/42/50vgk-en1 firmware,
- msz-ap25/35/42/50vgk-en2 firmware,
- msz-ap25/35/42/50vgk-en3 firmware,
- msz-ap25/35/42/50vgk-er1 firmware,
- msz-ap25/35/42/50vgk-et1 firmware,
- msz-ay25/35/42/50vgk-e1 firmware,
- msz-ay25/35/42/50vgk-e6 firmware,
- msz-ay25/35/42/50vgk-er1 firmware,
- msz-ay25/35/42/50vgk-et1 firmware,
- msz-ay25/35/42/50vgk-sc1 firmware,
- msz-ay25/35/42/50vgkp-e6 firmware,
- msz-ay25/35/42/50vgkp-er1 firmware,
- msz-ay25/35/42/50vgkp-et1 firmware,
- msz-ay25/35/42/50vgkp-sc1 firmware,
- msz-bt20/25/35/50vgk-e1 firmware,
- msz-bt20/25/35/50vgk-e2 firmware,
- msz-bt20/25/35/50vgk-e3 firmware,
- msz-bt20/25/35/50vgk-er1 firmware,
- msz-bt20/25/35/50vgk-er2 firmware,
- msz-bt20/25/35/50vgk-et1 firmware,
- msz-bt20/25/35/50vgk-et2 firmware,
- msz-bt20/25/35/50vgk-et3 firmware,
- msz-ef18/22/25/35/42/50vgkb-e1 firmware,
- msz-ef18/22/25/35/42/50vgkb-e2 firmware,
- msz-ef18/22/25/35/42/50vgks-e1 firmware,
- msz-ef18/22/25/35/42/50vgks-e2 firmware,
- msz-ef18/22/25/35/42/50vgkw-e1 firmware,
- msz-ef18/22/25/35/42/50vgkw-e2 firmware,
- msz-ef22/25/35/42/50vgkb-a1 firmware,
- msz-ef22/25/35/42/50vgkb-er1 firmware,
- msz-ef22/25/35/42/50vgkb-er2 firmware,
- msz-ef22/25/35/42/50vgkb-et1 firmware,
- msz-ef22/25/35/42/50vgkb-et2 firmware,
- msz-ef22/25/35/42/50vgks-a1 firmware,
- msz-ef22/25/35/42/50vgks-er1 firmware,
- msz-ef22/25/35/42/50vgks-er2 firmware,
- msz-ef22/25/35/42/50vgks-et1 firmware,
- msz-ef22/25/35/42/50vgks-et2 firmware,
- msz-ef22/25/35/42/50vgkw-a1 firmware,
- msz-ef22/25/35/42/50vgkw-er1 firmware,
- msz-ef22/25/35/42/50vgkw-er2 firmware,
- msz-ef22/25/35/42/50vgkw-et1 firmware,
- msz-ef22/25/35/42/50vgkw-et2 firmware,
- msz-exa09/12vak firmware,
- msz-eza09/12vak firmware,
- msz-ft25/35/50vgk-e1 firmware,
- msz-ft25/35/50vgk-e2 firmware,
- msz-ft25/35/50vgk-et1 firmware,
- msz-ft25/35/50vgk-sc1 firmware,
- msz-ft25/35/50vgk-sc2 firmware,
- msz-gzy09/12/18vfk firmware,
- msz-hr25/35/42/50/60/71vfk-e1 firmware,
- msz-hr25/35/42/50/60/71vfk-er1 firmware,
- msz-hr25/35/42/50/60/71vfk-et1 firmware,
- msz-hr25/35/42/50vfk-e6 firmware,
- msz-ky09/12/18vfk firmware,
- msz-ln18/25/35/50/60vg2b-e2 firmware,
- msz-ln18/25/35/50/60vg2b-e3 firmware,
- msz-ln18/25/35/50/60vg2r-e2 firmware,
- msz-ln18/25/35/50/60vg2r-e3 firmware,
- msz-ln18/25/35/50/60vg2v-e2 firmware,
- msz-ln18/25/35/50/60vg2v-e3 firmware,
- msz-ln18/25/35/50/60vg2w-e2 firmware,
- msz-ln18/25/35/50/60vg2w-e3 firmware,
- msz-ln18/25/35/50/60vg2w-er2 firmware,
- msz-ln18/25/35/50/60vg2w-et2 firmware,
- msz-ln18/25/35/50vg2w-sc1 firmware,
- msz-ln25/35/50/60vg2b-a2 firmware,
- msz-ln25/35/50/60vg2b-er2 firmware,
- msz-ln25/35/50/60vg2b-er3 firmware,
- msz-ln25/35/50/60vg2b-et2 firmware,
- msz-ln25/35/50/60vg2b-et3 firmware,
- msz-ln25/35/50/60vg2r-a2 firmware,
- msz-ln25/35/50/60vg2r-er2 firmware,
- msz-ln25/35/50/60vg2r-er3 firmware,
- msz-ln25/35/50/60vg2r-et2 firmware,
- msz-ln25/35/50/60vg2r-et3 firmware,
- msz-ln25/35/50/60vg2v-a2 firmware,
- msz-ln25/35/50/60vg2v-er2 firmware,
- msz-ln25/35/50/60vg2v-er3 firmware,
- msz-ln25/35/50/60vg2v-et2 firmware,
- msz-ln25/35/50/60vg2v-et3 firmware,
- msz-ln25/35/50/60vg2w-er3 firmware,
- msz-ln25/35/50/60vg2w-et3 firmware,
- msz-ln25/35/50vg2b-en2 firmware,
- msz-ln25/35/50vg2b-sc1 firmware,
- msz-ln25/35/50vg2r-en2 firmware,
- msz-ln25/35/50vg2r-sc1 firmware,
- msz-ln25/35/50vg2v-en2 firmware,
- msz-ln25/35/50vg2v-sc1 firmware,
- msz-ln25/35/50vg2w-en2 firmware,
- msz-rw25/35/50vg-e1 firmware,
- msz-rw25/35/50vg-er1 firmware,
- msz-rw25/35/50vg-et1 firmware,
- msz-rw25/35/50vg-sc1 firmware,
- msz-wx18/20/25vfk firmware,
- msz-zy09/12/18vfk firmware,
- s-mac-002if firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: