Vulnerabilites related to Omron - CJ-series and CS-series CPU modules
cve-2022-45794
Vulnerability from cvelistv5
Published
2024-01-10 22:56
Modified
2024-08-03 14:17
Severity ?
EPSS score ?
Summary
An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | CJ-series and CS-series CPU modules |
Version: 0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:04.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "CJ-series and CS-series CPU modules", "vendor": "Omron", "versions": [ { "status": "affected", "version": "0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Reid Wightman of Dragos, Inc." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\u003cbr\u003e" } ], "value": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\n" } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-22T16:39:10.643Z", "orgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "shortName": "Dragos" }, "references": [ { "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf" }, { "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Omron CJ-series and CS-series unauthenticated filesystem access.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "assignerShortName": "Dragos", "cveId": "CVE-2022-45794", "datePublished": "2024-01-10T22:56:58.836Z", "dateReserved": "2022-11-22T17:52:43.199Z", "dateUpdated": "2024-08-03T14:17:04.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45790
Vulnerability from cvelistv5
Published
2024-01-22 17:22
Modified
2024-11-13 16:53
Severity ?
EPSS score ?
Summary
The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | CJ-series and CS-series CPU modules |
Version: CJ2H 0.0 < 1.5 Version: CJ2M 0.0 < 2.1 Version: CJ1G 0.0 < 4.1 Version: CS1H 0.0 < 4.1 Version: CS1G 0.0 < 4.1 Version: CS1D-H 0.0 < 1.4 Version: CP1E-E 0.0 < 1.3 Version: CP1E-N 0.0 < 1.3 Version: CS1D-P 0.0 < 1.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:04.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05" }, { "tags": [ "x_transferred" ], "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-010_en.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45790", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-25T20:23:52.957365Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T16:53:38.204Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CJ-series and CS-series CPU modules", "vendor": "Omron", "versions": [ { "lessThan": "1.5", "status": "affected", "version": "CJ2H 0.0", "versionType": "custom" }, { "lessThan": "2.1", "status": "affected", "version": "CJ2M 0.0", "versionType": "custom" }, { "lessThan": "4.1", "status": "affected", "version": "CJ1G 0.0", "versionType": "custom" }, { "lessThan": "4.1", "status": "affected", "version": "CS1H 0.0", "versionType": "custom" }, { "lessThan": "4.1", "status": "affected", "version": "CS1G 0.0", "versionType": "custom" }, { "lessThan": "1.4", "status": "affected", "version": "CS1D-H 0.0", "versionType": "custom" }, { "lessThan": "1.3", "status": "affected", "version": "CP1E-E 0.0", "versionType": "custom" }, { "lessThan": "1.3", "status": "affected", "version": "CP1E-N 0.0", "versionType": "custom" }, { "lessThan": "1.4", "status": "affected", "version": "CS1D-P 0.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic." } ], "value": "The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic." } ], "impacts": [ { "capecId": "CAPEC-629", "descriptions": [ { "lang": "en", "value": "CAPEC-629 Unauthorized Use of Device Resources" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307 Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-22T17:22:14.476Z", "orgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "shortName": "Dragos" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05" }, { "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-010_en.pdf" }, { "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Omron FINS memory protection susceptible to bruteforce", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "assignerShortName": "Dragos", "cveId": "CVE-2022-45790", "datePublished": "2024-01-22T17:22:14.476Z", "dateReserved": "2022-11-22T17:52:43.198Z", "dateUpdated": "2024-11-13T16:53:38.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }