SB2023011819 - Predictable Seed in Pseudo-Random Number Generator in Mitsubishi Electric MELSEC iQ-F, iQ-R Series



SB2023011819 - Predictable Seed in Pseudo-Random Number Generator in Mitsubishi Electric MELSEC iQ-F, iQ-R Series

Published: January 18, 2023 Updated: April 11, 2023

Security Bulletin ID SB2023011819
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Predictable Seed in Pseudo-Random Number Generator (PRNG) (CVE-ID: CVE-2022-40267)

The vulnerability allows a remote attacker to compromise the system.

The vulnerability exists due to predictable seed in the pseudo-random number generator within the WEB server function. A remote attacker can bypass authorization on the target system.

This vulnerability affects the following products:

  • MELSEC iQ-F Series with serial number 17X**** or later:  
    • FX5U-xMy/z x=32,64,80, y=T,R, z=ES,DS,ESS,DSS: Versions 1.280 and prior 
    • FX5UC-xMy/z x=32,64,96 y=T, z=D,DSS: Versions 1.280 and prior 
  • MELSEC iQ-F Series with serial number 179**** and prior:  
    • FX5U-xMy/z x=32,64,80, y=T,R, z=ES,DS,ESS,DSS: Versions 1.074 and prior 
    • FX5UC-xMy/z x=32,64,96 y=T, z=D,DSS: Versions 1.074 and prior 
  • MELSEC iQ-F Series FX5UC-32MT/DS-TS, FX5UC-32MT/DSS-TS, FX5UC-32MR/DS-TS: Versions 1.280 and prior 
  • MELSEC iQ-R Series R00/01/02CPU: All versions 
  • MELSEC iQ-R Series R04/08/16/32/ 120(EN)CPU: All versions 

Remediation

Install update from vendor's website.