CVE-2022-33321

high-risk
Published 2022-11-08

Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Do I need to act?

-
0.76% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (20)

Mac-557If-E Firmware
Mac-557If-E1 Firmware
Pac-Wf010-E Firmware
Mac-566Ifb-E Firmware
Mac-576If-E1 Firmware
Mac-567Ifb-E Firmware
Mac-567Ifb2-E Firmware
Mac-558If-E Firmware
Mac-558If-E1 Firmware
Mac-559If-E Firmware
Mac-559If-E1 Firmware
Mac-568If-E Firmware
Mac-568Ifb-E Firmware
Mac-568Ifb2-E Firmware
Mac-568Ifb3-E Firmware
Pac-Whs01Wf-E Firmware
S-Mac-702If-F Firmware
S-Mac-702If-Z Firmware
S-Mac-702If-B Firmware
S-Mac-905If Firmware

Affected Vendors

68
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 3/34 · Minimal
Exposure 33/34 · Critical