Vulnerabilites related to omron - cx-position
cve-2022-26417
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-22-578/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | CX-Position |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:03:32.822Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-578/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "datePublic": "2022-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-05T15:06:07", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-578/" } ], "solutions": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" }, "title": "Rockwell Automation Studio 5000 Logix Designer Use After Free", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2022-03-29T19:11:00.000Z", "ID": "CVE-2022-26417", "STATE": "PUBLIC", "TITLE": "Rockwell Automation Studio 5000 Logix Designer Use After Free" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.5.3" } ] } } ] }, "vendor_name": "Omron" } ] } }, "credit": [ { "lang": "eng", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-578/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-578/" } ] }, "solution": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-26417", "datePublished": "2022-04-01T22:17:53.991123Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-09-17T01:31:01.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27257
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:13", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27257", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27257", "datePublished": "2021-02-09T14:10:19.507744Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-17T02:47:28.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-25959
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-22-577/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | CX-Position |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:36.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-577/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "datePublic": "2022-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-05T15:06:08", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-577/" } ], "solutions": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" }, "title": "Rockwell Automation Studio 5000 Logix Designer Improper Restriction of Operations within the Bounds of a Memory Buffer", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2022-03-29T19:11:00.000Z", "ID": "CVE-2022-25959", "STATE": "PUBLIC", "TITLE": "Rockwell Automation Studio 5000 Logix Designer Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.5.3" } ] } } ] }, "vendor_name": "Omron" } ] } }, "credit": [ { "lang": "eng", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-577/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-577/" } ] }, "solution": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-25959", "datePublished": "2022-04-01T22:17:53.047182Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-09-16T16:39:07.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27261
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:17", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27261", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27261", "datePublished": "2021-02-09T14:09:34.782476Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-17T00:02:18.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27259
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "UNTRUSTED POINTER DEREFERENCE CWE-822", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:18", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27259", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNTRUSTED POINTER DEREFERENCE CWE-822" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27259", "datePublished": "2021-02-09T14:09:11.732043Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-16T16:33:13.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26419
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-22-580/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-579/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-576/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-575/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | CX-Position |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:03:32.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-580/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-579/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-576/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-575/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "datePublic": "2022-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-05T15:06:15", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-580/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-579/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-576/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-575/" } ], "solutions": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" }, "title": "Rockwell Automation Studio 5000 Logix Designer Code Injection", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2022-03-29T19:11:00.000Z", "ID": "CVE-2022-26419", "STATE": "PUBLIC", "TITLE": "Rockwell Automation Studio 5000 Logix Designer Code Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.5.3" } ] } } ] }, "vendor_name": "Omron" } ] } }, "credit": [ { "lang": "eng", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-580/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-580/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-579/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-579/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-576/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-576/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-575/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-575/" } ] }, "solution": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-26419", "datePublished": "2022-04-01T22:17:56.304742Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-09-16T18:08:28.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26022
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-22-581/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | CX-Position |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:36.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-581/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "datePublic": "2022-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-05T15:06:16", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-581/" } ], "solutions": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" }, "title": "Rockwell Automation Studio 5000 Logix Designer Out-of-Bounds Write", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2022-03-29T19:11:00.000Z", "ID": "CVE-2022-26022", "STATE": "PUBLIC", "TITLE": "Rockwell Automation Studio 5000 Logix Designer Out-of-Bounds Write" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.5.3" } ] } } ] }, "vendor_name": "Omron" } ] } }, "credit": [ { "lang": "eng", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787 Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-581/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-581/" } ] }, "solution": [ { "lang": "en", "value": "Omron has provided Version 2.5.4, which is only available to paying users who use the \u201cAuto Update\u201d function. Please contact Omron technical Support or an Omron representative for specific update information." } ], "source": { "advisory": "ICSA-22-088-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-26022", "datePublished": "2022-04-01T22:17:55.227035Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-09-17T00:31:02.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202203-1535
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1535", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-577" } ], "trust": 0.7 }, "cve": "CVE-2022-25959", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-25959", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418113", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-25959", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001556", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-25959", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-25959", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-25959", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-25959", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2022-25959", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-2484", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418113", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-25959" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-25959", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-577", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001556", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14677", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2484", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418113", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "id": "VAR-202203-1535", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418113" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:52.206000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Buffer error (CWE-119) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-577/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25959" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-25959/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-577" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418113" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "date": "2022-04-01T23:15:14.470000", "db": "NVD", "id": "CVE-2022-25959" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-577" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418113" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "date": "2023-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "date": "2024-11-21T06:53:15.767000", "db": "NVD", "id": "CVE-2022-25959" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2484" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron\u00a0CX-Position\u00a0 Buffer Error Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001556" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2484" } ], "trust": 0.6 } }
var-202102-0317
Vulnerability from variot
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-182" } ], "trust": 0.7 }, "cve": "CVE-2020-27259", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27259", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370741", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-27259", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27259", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27259", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-27259", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-405", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "description": { "_id": null, "data": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27259" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" } ], "trust": 2.34 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27259", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-182", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11807", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-405", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370741", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "id": "VAR-202102-0317", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370741" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.455000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "Omron Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138518" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-822", "trust": 1.8 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-182/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "date": "2021-02-09T15:15:13.097000", "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "date": "2021-02-11T00:00:00", "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "date": "2024-11-21T05:20:57.497000", "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-405" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON CX-One Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ], "trust": 0.8 }, "type": { "_id": null, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-405" } ], "trust": 0.6 } }
var-202203-1537
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1537", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-578" } ], "trust": 0.7 }, "cve": "CVE-2022-26417", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-26417", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418115", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26417", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001554", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26417", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26417", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-26417", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-26417", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2022-26417", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-2481", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418115", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-26417" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26417", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-578", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001554", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14753", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2481", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418115", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "id": "VAR-202203-1537", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418115" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:51.847000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-578/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26417" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26417/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-578" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418115" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "date": "2022-04-01T23:15:14.590000", "db": "NVD", "id": "CVE-2022-26417" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-578" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418115" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "date": "2022-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "date": "2024-11-21T06:53:54.740000", "db": "NVD", "id": "CVE-2022-26417" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron\u00a0CX-Position\u00a0 Vulnerabilities in the use of freed memory", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2481" } ], "trust": 0.6 } }
var-202203-1536
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1536", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-581" } ], "trust": 0.7 }, "cve": "CVE-2022-26022", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-26022", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418114", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26022", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001555", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26022", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26022", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-26022", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-26022", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2022-26022", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-2480", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418114", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-26022" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26022", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-581", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001555", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14778", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2480", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-73188", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418114", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "id": "VAR-202203-1536", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418114" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:51.923000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-581/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26022" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26022/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-581" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418114" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "date": "2022-04-01T23:15:14.530000", "db": "NVD", "id": "CVE-2022-26022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-581" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418114" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "date": "2022-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "date": "2024-11-21T06:53:19.680000", "db": "NVD", "id": "CVE-2022-26022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2480" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron\u00a0CX-Position\u00a0 Out-of-bounds Vulnerability in Microsoft", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001555" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2480" } ], "trust": 0.6 } }
var-202102-0318
Vulnerability from variot
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 1.4, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" } ], "trust": 1.4 }, "cve": "CVE-2020-27261", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27261", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370745", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27261", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-27261", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2020-27261", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27261", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202101-408", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370745", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "description": { "_id": null, "data": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27261" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" } ], "trust": 2.97 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27261", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-185", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-21-183", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11810", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11808", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-408", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370745", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "id": "VAR-202102-0318", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370745" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.419000Z", "patch": { "_id": null, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron Repair measures for buffer errors and vulnerabilities in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138519" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-822", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "references": { "_id": null, "data": [ { "trust": 4.5, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-185/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-183/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "date": "2021-02-09T15:15:13.157000", "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "date": "2021-02-11T00:00:00", "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "date": "2024-11-21T05:20:57.687000", "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-408" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One NCI File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" } ], "trust": 1.4 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-408" } ], "trust": 0.6 } }
var-202102-0316
Vulnerability from variot
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-184" } ], "trust": 0.7 }, "cve": "CVE-2020-27257", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27257", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370737", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27257", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27257", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27257", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-27257", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-423", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "description": { "_id": null, "data": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27257" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" } ], "trust": 2.34 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27257", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-184", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11809", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-423", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370737", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "id": "VAR-202102-0316", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370737" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.485000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "Omron Repair measures for buffer errors and vulnerabilities in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138532" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-843", "trust": 1.9 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-822", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-184/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "date": "2021-02-09T15:15:12.970000", "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "date": "2021-02-12T00:00:00", "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "date": "2024-11-21T05:20:57.303000", "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-423" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON CX-One Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ], "trust": 0.8 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-423" } ], "trust": 0.6 } }
var-202203-1538
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1538", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-one", "scope": null, "trust": 2.8, "vendor": "omron", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" } ], "trust": 2.8 }, "cve": "CVE-2022-26419", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-26419", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418116", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26419", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.8, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26419", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001553", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2022-26419", "trust": 2.8, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2022-26419", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-26419", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-26419", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-2487", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418116", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-26419" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" } ], "trust": 4.23 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26419", "trust": 6.1 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-580", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-22-579", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-22-576", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-22-575", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001553", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14776", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14775", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14676", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14674", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2487", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418116", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "id": "VAR-202203-1538", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418116" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:51.879000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 2.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron CX-Position Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=188369" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 5.3, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-580/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-575/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-576/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-579/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26419" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26419/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-580" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-579" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-576" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-575" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418116" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "date": "2022-04-01T23:15:14.647000", "db": "NVD", "id": "CVE-2022-26419" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-580" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-579" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-576" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-575" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418116" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "date": "2022-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "date": "2024-11-21T06:53:54.863000", "db": "NVD", "id": "CVE-2022-26419" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2487" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-One CX-Position NCI File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" } ], "trust": 2.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2487" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-22-577/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-577/ | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-position | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8E2155-0F09-4E95-8D64-3E2D779191F3", "versionEndIncluding": "2.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code." }, { "lang": "es", "value": "Omron CX-Position (versiones 2.5.3 y anteriores) es vulnerable a una corrupci\u00f3n de memoria mientras es procesado un archivo de proyecto espec\u00edfico, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2022-25959", "lastModified": "2024-11-21T06:53:15.767", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:14.470", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-577/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-577/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." }, { "lang": "es", "value": "Esta vulnerabilidad permite a atacantes locales ejecutar c\u00f3digo arbitrario debido a una falta de comprobaci\u00f3n apropiada de los datos suministrados por un usuario, lo que puede resultar en una condici\u00f3n de confusi\u00f3n de tipos en Omron CX-One Versi\u00f3n 4.60 y dispositivos anteriores" } ], "id": "CVE-2020-27257", "lastModified": "2024-11-21T05:20:57.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:12.970", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-22-581/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-581/ | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-position | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8E2155-0F09-4E95-8D64-3E2D779191F3", "versionEndIncluding": "2.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code." }, { "lang": "es", "value": "Omron CX-Position (versiones 2.5.3 y anteriores) es vulnerable a una escritura fuera de l\u00edmites mientras es procesado un archivo de proyecto espec\u00edfico, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2022-26022", "lastModified": "2024-11-21T06:53:19.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:14.530", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-581/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-581/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-22-578/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-578/ | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-position | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8E2155-0F09-4E95-8D64-3E2D779191F3", "versionEndIncluding": "2.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code." }, { "lang": "es", "value": "Omron CX-Position (versiones 2.5.3 y anteriores) es vulnerable a una condici\u00f3n de uso de memoria previamente liberada mientras procesa un archivo de proyecto espec\u00edfico, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2022-26417", "lastModified": "2024-11-21T06:53:54.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:14.590", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-578/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-578/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." }, { "lang": "es", "value": "Omron CX-One versiones 4.60 y anteriores, puede permitir a un atacante suministrar un puntero a ubicaciones de memoria arbitrarias, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente" } ], "id": "CVE-2020-27259", "lastModified": "2024-11-21T05:20:57.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:13.097", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-822" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
omron | cx-position | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8E2155-0F09-4E95-8D64-3E2D779191F3", "versionEndIncluding": "2.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code." }, { "lang": "es", "value": "Omron CX-Position (versiones 2.5.3 y anteriores) es vulnerable a m\u00faltiples condiciones de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria mientras analiza un archivo de proyecto espec\u00edfico, lo que puede permitir a un atacante ejecutar localmente c\u00f3digo arbitrario" } ], "id": "CVE-2022-26419", "lastModified": "2024-11-21T06:53:54.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-01T23:15:14.647", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-575/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-576/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-579/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-580/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-575/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-576/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-579/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-580/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | Third Party Advisory | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." }, { "lang": "es", "value": "El Omron CX-One versiones 4.60 y anteriores es vulnerable a un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente" } ], "id": "CVE-2020-27261", "lastModified": "2024-11-21T05:20:57.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:13.157", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }