Vulnerabilites related to omron - na5-12w
cve-2022-34151
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf | x_refsource_MISC | |
https://jvn.jp/en/vu/JVNVU97050784/index.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
OMRON Corporation | Machine automation controller NJ series, Machine automation controller NX series, Automation software 'Sysmac Studio', and Programmable Terminal (PT) NA series |
Version: Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:16:17.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Machine automation controller NJ series, Machine automation controller NX series, Automation software \u0027Sysmac Studio\u0027, and Programmable Terminal (PT) NA series", "vendor": "OMRON Corporation", "versions": [ { "status": "affected", "version": "Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller." } ], "problemTypes": [ { "descriptions": [ { "description": "Use of Hard-coded Credentials", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-04T02:25:19", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-34151", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Machine automation controller NJ series, Machine automation controller NX series, Automation software \u0027Sysmac Studio\u0027, and Programmable Terminal (PT) NA series", "version": { "version_data": [ { "version_value": "Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier" } ] } } ] }, "vendor_name": "OMRON Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use of Hard-coded Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf", "refsource": "MISC", "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "name": "https://jvn.jp/en/vu/JVNVU97050784/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-34151", "datePublished": "2022-07-04T01:51:00", "dateReserved": "2022-06-21T00:00:00", "dateUpdated": "2024-08-03T08:16:17.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33208
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf | x_refsource_MISC | |
https://jvn.jp/en/vu/JVNVU97050784/index.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
OMRON Corporation | Machine automation controller NJ series, Machine automation controller NX series, Automation software 'Sysmac Studio', and Programmable Terminal (PT) NA series |
Version: Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:01:20.422Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Machine automation controller NJ series, Machine automation controller NX series, Automation software \u0027Sysmac Studio\u0027, and Programmable Terminal (PT) NA series", "vendor": "OMRON Corporation", "versions": [ { "status": "affected", "version": "Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass by Capture-replay", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-04T02:25:11", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-33208", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Machine automation controller NJ series, Machine automation controller NX series, Automation software \u0027Sysmac Studio\u0027, and Programmable Terminal (PT) NA series", "version": { "version_data": [ { "version_value": "Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier" } ] } } ] }, "vendor_name": "OMRON Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass by Capture-replay" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf", "refsource": "MISC", "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "name": "https://jvn.jp/en/vu/JVNVU97050784/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-33208", "datePublished": "2022-07-04T01:50:44", "dateReserved": "2022-06-21T00:00:00", "dateUpdated": "2024-08-03T08:01:20.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202207-0037
Vulnerability from variot
Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-34151 It was * Applicable controller products and automation software Sysmac Studio unauthorized access to the controller product by a third party who can analyze the communication between the controller and the programmable terminal. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. Omron Machine automation controller NX7 series, etc. are all products of Japan's Omron (Omron). Omron Machine automation controller NX7 series is a series of machine automation controllers. Omron Machine automation controller NX1 series is a series of machine automation controllers. An attacker could exploit this vulnerability to gain full access to a vulnerable system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0037", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx1w-cif01", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-5300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1140dt", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-1520", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-1600", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nj501-r520", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4500", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1000", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-1500", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r420", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-15w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nj501-1420", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj-pd3001", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-1020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-9024dt1", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-9000", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-z600", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx102-1200", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-1300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "sysmac studio", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.49" }, { "model": "nj501-1320", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r500", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4310", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1100", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-7w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nj501-140", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-12w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nx102-1020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj301-1100", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-1000", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-mab221", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-1720", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx701-z700", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx701-1620", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx1w-cif12", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1040dt1", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-9020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj301-1200", "scope": "lt", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj-pa3001", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-adb21", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4400", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1220", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-9024dt", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-cif11", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4320", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-9020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1040dt", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-9w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nj501-1340", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1120", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r400", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1140dt1", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r320", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-dab21v", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-1700", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 sysmac studio", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "\u30d7\u30ed\u30b0\u30e9\u30de\u30d6\u30eb\u30bf\u30fc\u30df\u30ca\u30eb na \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nx \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nj \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "NVD", "id": "CVE-2022-34151" } ] }, "cve": "CVE-2022-34151", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-34151", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-426451", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2022-34151", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 9.4, "baseSeverity": "Critical", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2022-002691", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-34151", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2022-002691", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202207-356", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-426451", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34151", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-426451" }, { "db": "VULMON", "id": "CVE-2022-34151" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-356" }, { "db": "NVD", "id": "CVE-2022-34151" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-34151 It was * Applicable controller products and automation software Sysmac Studio unauthorized access to the controller product by a third party who can analyze the communication between the controller and the programmable terminal. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. Omron Machine automation controller NX7 series, etc. are all products of Japan\u0027s Omron (Omron). Omron Machine automation controller NX7 series is a series of machine automation controllers. Omron Machine automation controller NX1 series is a series of machine automation controllers. An attacker could exploit this vulnerability to gain full access to a vulnerable system", "sources": [ { "db": "NVD", "id": "CVE-2022-34151" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "VULHUB", "id": "VHN-426451" }, { "db": "VULMON", "id": "CVE-2022-34151" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34151", "trust": 3.4 }, { "db": "JVN", "id": "JVNVU97050784", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2022-002691", "trust": 1.4 }, { "db": "USCERT", "id": "AA22-103A", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-356", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022070405", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-426451", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34151", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-426451" }, { "db": "VULMON", "id": "CVE-2022-34151" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-356" }, { "db": "NVD", "id": "CVE-2022-34151" } ] }, "id": "VAR-202207-0037", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-426451" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:43.121000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "machine automation controller \u00a0NJ/NX\u00a0 Authentication Bypass Vulnerability in Communication Function of Series Omron Corporation", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/vulnerability/OMSR-2022-001_ja.pdf" }, { "title": "Multiple Omron Repair measures for product trust management problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=200206" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-356" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-798", "trust": 1.0 }, { "problemtype": "Capture-replay authentication evasion by (CWE-294) [ others ]", "trust": 0.8 }, { "problemtype": " debug code in active state (CWE-489) [ others ]", "trust": 0.8 }, { "problemtype": " Use hard-coded credentials (CWE-798) [ others ]", "trust": 0.8 }, { "problemtype": "CWE-294", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-426451" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "NVD", "id": "CVE-2022-34151" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://jvn.jp/en/vu/jvnvu97050784/index.html" }, { "trust": 1.8, "url": "https://www.ia.omron.com/product/vulnerability/omsr-2022-001_en.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu97050784/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34151" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33208" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33971" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-103a" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34151/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022070405" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-002691.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/294.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-426451" }, { "db": "VULMON", "id": "CVE-2022-34151" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-356" }, { "db": "NVD", "id": "CVE-2022-34151" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-426451" }, { "db": "VULMON", "id": "CVE-2022-34151" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-356" }, { "db": "NVD", "id": "CVE-2022-34151" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-04T00:00:00", "db": "VULHUB", "id": "VHN-426451" }, { "date": "2022-07-04T00:00:00", "db": "VULMON", "id": "CVE-2022-34151" }, { "date": "2022-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "date": "2022-07-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-356" }, { "date": "2022-07-04T02:15:07.727000", "db": "NVD", "id": "CVE-2022-34151" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-15T00:00:00", "db": "VULHUB", "id": "VHN-426451" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2022-34151" }, { "date": "2022-11-09T08:53:00", "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "date": "2022-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-356" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-34151" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-356" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in multiple Omron products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002691" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-356" } ], "trust": 0.6 } }
var-202207-0036
Vulnerability from variot
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. are all products of Japan's Omron (Omron). A remote attacker could exploit this vulnerability to bypass the authentication process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0036", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx1w-cif01", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-5300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1140dt", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-1520", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-1600", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nj501-r520", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4500", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1000", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-1500", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r420", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-15w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nj501-1420", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj-pd3001", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-1020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-9024dt1", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-9000", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-z600", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx102-1200", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-1300", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "sysmac studio", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.49" }, { "model": "nj501-1320", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r500", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4310", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1100", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-7w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nj501-140", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-12w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nx102-1020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj301-1100", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-1000", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-mab221", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-1720", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx701-z700", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx701-1620", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "nx1w-cif12", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1040dt1", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj101-9020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj301-1200", "scope": "lt", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj-pa3001", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-adb21", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4400", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1220", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-9024dt", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-cif11", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-4320", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-9020", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1040dt", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "na5-9w", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.15" }, { "model": "nj501-1340", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx102-1120", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r400", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1p2-1140dt1", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nj501-r320", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx1w-dab21v", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.48" }, { "model": "nx701-1700", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.28" }, { "model": "\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 sysmac studio", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "\u30d7\u30ed\u30b0\u30e9\u30de\u30d6\u30eb\u30bf\u30fc\u30df\u30ca\u30eb na \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nx \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nj \u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "NVD", "id": "CVE-2022-33208" } ] }, "cve": "CVE-2022-33208", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-33208", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-426449", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2022-33208", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-002691", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-33208", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2022-002691", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202207-355", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-426449", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-33208", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-426449" }, { "db": "VULMON", "id": "CVE-2022-33208" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-355" }, { "db": "NVD", "id": "CVE-2022-33208" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. are all products of Japan\u0027s Omron (Omron). A remote attacker could exploit this vulnerability to bypass the authentication process", "sources": [ { "db": "NVD", "id": "CVE-2022-33208" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "VULHUB", "id": "VHN-426449" }, { "db": "VULMON", "id": "CVE-2022-33208" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33208", "trust": 3.4 }, { "db": "JVN", "id": "JVNVU97050784", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2022-002691", "trust": 1.4 }, { "db": "USCERT", "id": "AA22-103A", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-355", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022070405", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-426449", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-33208", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-426449" }, { "db": "VULMON", "id": "CVE-2022-33208" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-355" }, { "db": "NVD", "id": "CVE-2022-33208" } ] }, "id": "VAR-202207-0036", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-426449" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:43.088000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "machine automation controller \u00a0NJ/NX\u00a0 Authentication Bypass Vulnerability in Communication Function of Series Omron Corporation", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/vulnerability/OMSR-2022-001_ja.pdf" }, { "title": "Multiple Omron Product security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=200205" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-355" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-294", "trust": 1.1 }, { "problemtype": "Capture-replay authentication evasion by (CWE-294) [ others ]", "trust": 0.8 }, { "problemtype": " debug code in active state (CWE-489) [ others ]", "trust": 0.8 }, { "problemtype": " Use hard-coded credentials (CWE-798) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-426449" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "NVD", "id": "CVE-2022-33208" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://jvn.jp/en/vu/jvnvu97050784/index.html" }, { "trust": 1.8, "url": "https://www.ia.omron.com/product/vulnerability/omsr-2022-001_en.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu97050784/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34151" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33208" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33971" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-103a" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022070405" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33208/" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-002691.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/294.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-426449" }, { "db": "VULMON", "id": "CVE-2022-33208" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-355" }, { "db": "NVD", "id": "CVE-2022-33208" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-426449" }, { "db": "VULMON", "id": "CVE-2022-33208" }, { "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "db": "CNNVD", "id": "CNNVD-202207-355" }, { "db": "NVD", "id": "CVE-2022-33208" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-04T00:00:00", "db": "VULHUB", "id": "VHN-426449" }, { "date": "2022-07-04T00:00:00", "db": "VULMON", "id": "CVE-2022-33208" }, { "date": "2022-11-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "date": "2022-07-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-355" }, { "date": "2022-07-04T02:15:07.570000", "db": "NVD", "id": "CVE-2022-33208" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-15T00:00:00", "db": "VULHUB", "id": "VHN-426449" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2022-33208" }, { "date": "2022-11-09T08:53:00", "db": "JVNDB", "id": "JVNDB-2022-002691" }, { "date": "2022-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-355" }, { "date": "2022-07-15T17:06:55.383000", "db": "NVD", "id": "CVE-2022-33208" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-355" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in multiple Omron products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002691" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-355" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU97050784/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU97050784/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf | Mitigation, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C32C9A6D-2AF6-4005-AD33-E54B2726A769", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1600:-:*:*:*:*:*:*:*", "matchCriteriaId": "A613C260-184B-4131-B2EC-656D8322F86B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "929C2ED9-5BBD-4585-A95F-A3C5F12C5376", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1700:-:*:*:*:*:*:*:*", "matchCriteriaId": "753A218D-C738-42E5-B523-ED7CACCAEC82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-z700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B87C2BC4-8CDE-42CA-B0D3-EEBEAD0BCECF", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-z700:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F25E10-A76C-4A16-B72B-4B9E572EDBAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-z600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "586D8ACC-BD51-403C-AAF6-55392741D582", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-z600:-:*:*:*:*:*:*:*", "matchCriteriaId": "90B7C106-4C14-4C0A-BA78-9A3DD63EF576", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67236B5C-8045-4413-8767-1F0904EF6E7F", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*", "matchCriteriaId": "2434BE7E-3E5D-48A9-838C-BCC6055135F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1805212B-75E3-4443-A7D4-B889EA53721A", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D7FA7-18A3-45B7-976B-9DEDC59294C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91116EDD-1D61-4D78-9367-C78E80E85BE3", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A6528B-2160-4CE4-88B2-EC69DB5797B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEA800B1-6E43-45C8-833E-744831490B98", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E68759-07B1-4F7B-8EF8-0429C8CFCAAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "509A80E2-0FE2-4E65-A276-351953EA403D", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D01F33E2-E10C-4B3F-9326-7022924423DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3A572C4-8EDA-4A4D-9358-9E2313F9D71A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE463BB1-BE67-4D80-8FE7-85F960945AF5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "960BC2F9-7B36-419A-BEF6-1895666422A2", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "E72347A8-8725-4DAB-9D2C-609072A4E904", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F70AA8-7DB0-415F-AB71-4F527E930C56", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1A91E22-8F08-4470-BC4A-14D25A827607", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-9020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644FC209-89BD-46E5-BD08-1A9518200AF4", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-9020:-:*:*:*:*:*:*:*", "matchCriteriaId": "34CE73C8-BF67-4BC3-81B2-275393441C91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1140dt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53B955C2-94EE-4C9A-9858-B38AF619640A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1140dt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFF59B0A-C08C-4D56-B301-631DD155BEF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1140dt1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B73A630B-5A24-459F-80E5-E88C0D3C04BD", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1140dt1:-:*:*:*:*:*:*:*", "matchCriteriaId": "63EEFB13-8B20-4A42-8511-98C4C8E045FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1040dt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29BDE27D-6AFE-459A-B368-4D59BF2112EB", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1040dt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7EF898A-8273-4044-8F4B-B2082294749F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1040dt1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD05B298-12C5-48B7-814D-62CA3DD6623A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1040dt1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD457B-3E36-4C10-B34F-21CD0B931459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-9024dt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C0048B2-460B-4795-A23F-B83EC8830900", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-9024dt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B1E7DBC-6211-4503-9154-D0BD0FA3BE95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-9024dt1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB34E3A4-B7AF-461F-BA78-48C496B064D6", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-9024dt1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F193D7DE-97C1-4883-871D-78AC7FCB9B14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-cif01_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2279FB9-11F5-4846-92C9-C657E36D7B02", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-cif01:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9E45E4A-447D-4DE9-AC15-50BD2DEC5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-cif11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E1F7962-856D-4C94-A3FE-A14591B5B982", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-cif11:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA6772B4-5B9D-4642-9DA6-5595C92895C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-cif12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60836E6B-91EC-44A7-8FFF-535A32A83986", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-cif12:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD3B3071-1C48-4AD0-9C82-59A16F52944D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-adb21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92D1E782-1625-41E0-81C2-F247628B1081", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-adb21:-:*:*:*:*:*:*:*", "matchCriteriaId": "148C75FA-08F5-401A-B4E9-989ED80AF3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-dab21v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6F2CDD-7D0F-480E-9925-8A6F2B1D2825", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-dab21v:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA779FC7-7C37-411C-BFD3-EE9B87E8D861", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-mab221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88219CC-5788-4B68-95C7-1D6746CCF5C7", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-mab221:-:*:*:*:*:*:*:*", "matchCriteriaId": "48E3688A-B3EE-441E-A16A-52FC683D4F1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03C70E33-A661-4974-A0D4-935C6EE1CB7A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD281699-D123-4301-9EDF-4BE249E24FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-140_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4A80DE2-ECC9-4B35-B999-57573D386581", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-140:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4824951-49CB-4E85-A736-28A72C514FB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD94505F-4294-4BF2-8A2F-13FC419D3D96", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2917E7F0-DAA8-4D3B-A5E4-FB0ACAEF02C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E01A5FE5-B310-4C46-93FB-A6A8B492E179", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A1BA508-3DBE-46C4-B72C-312AC3403C27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDEDFECF-1490-4B47-BD5A-54F560C80CF4", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r520:-:*:*:*:*:*:*:*", "matchCriteriaId": "36BDD615-7933-4EF5-B2E5-68EB4FA776B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8FB4EB9-6E39-423B-84EF-B97698F896F0", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A453709-E9EE-4DD8-8638-04752B9DFB0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r420_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD6DAE59-9863-44EE-97CC-503B980FB9AA", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r420:-:*:*:*:*:*:*:*", "matchCriteriaId": "C264C95F-F8CE-4EC1-B5A5-71998F0A75C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B4F9EF2-6C73-40AA-AF3B-BCCDFAF92E0A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r300:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A4809E-770F-4D7B-A532-37160D8A3943", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84C41F6C-7B86-4823-8214-9C244283C3AE", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "32E135F9-CB75-49AF-B7C3-25E8EA3AB991", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A1EC714-602B-4946-9857-EA601CEE8504", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FEF30DD-FCF0-499E-B5C2-4184C9A7E9D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BA40F4B-9EA2-416C-876C-714927FF9F32", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE1648-D428-4A43-831D-AB3AF3F05739", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1420_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BED01-FC93-49D6-8623-053EE4327EAB", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*", "matchCriteriaId": "148C6AE8-1480-4822-8E0B-1E8575246878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56A035E5-FBAD-44D1-879E-9C4062DF02B4", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*", "matchCriteriaId": "69D21068-A51D-48B2-BF17-68BC61737EBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-1020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7E91BEB-06D4-4B01-8BC6-B252F299EBB0", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A75CF5D-0ADE-448E-BF3C-8E2C268EE1BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-9020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CB51A57-B840-4E4E-A970-B95E61B9D325", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*", "matchCriteriaId": "8696CE8A-C041-4EED-888B-36F2E499E67A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1340_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E7ADA83-1E1B-459C-966C-00DD46B96198", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B381AE4-A769-403A-97FA-14FA5F8122CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E19F9721-B79A-4C5D-8414-86C709D4C292", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E8F99DC-4992-4141-AD76-B8A0A690AD4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7124BF89-F495-4C5D-BBC8-7FFF4F160B1D", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D53224A-F4AE-42D5-9CE6-C46892BD658D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1226F0B5-3300-4A13-B692-62C6DB407810", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB77802D-96CB-49DB-A912-9DB901130F08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4310_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC21723E-18CF-4AC3-9EF7-0DC59D6438DF", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4310:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FDF3ECD-A475-44D1-BF08-B1D60F33D163", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB81B854-8606-4EAB-BCB1-C45AFF315F7F", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*", "matchCriteriaId": "060083B0-E9E5-4694-94AB-3517B4B6E0C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj301-1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9C2854F-BDBC-42CB-AE2C-D2682B285EC1", "versionEndExcluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D279907-5CF4-416F-BE78-300FD52B5B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj301-1100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90EF11A3-0FC3-46C8-9AC7-90A6768149A3", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D92B425-000A-4A85-820E-E16B8AFF06B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7C4F791-6705-4501-AAAD-A08B8731A644", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5A77DA0-B22A-4C26-8E64-6F272CD420A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-9000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8EBA4D5-57A7-4AB4-80C8-B3AA0881438B", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3883A8C-C4EC-45F0-B164-0BADFF91E361", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj-pa3001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "902CECE1-A411-43D6-9FE6-C80D92F79909", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj-pa3001:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E4422C-0758-4A41-B3C9-FB239E3440B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj-pd3001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F4612C4-A7B2-44CD-8138-18B5A0A537D5", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj-pd3001:-:*:*:*:*:*:*:*", "matchCriteriaId": "377396A7-4CDD-4768-AA23-A0B063962CC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:sysmac_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0C9C903-58E8-4AAD-9D8B-98EFB3CD5261", "versionEndIncluding": "1.49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-15w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26005582-DD0D-45F3-8FA6-4B1A5DB72B1A", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-15w:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B1DD5F-1260-4FF1-BE5F-42CF2748AA83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-12w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FA1DFB3-0E4A-4864-81E7-505064C6C6E4", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-12w:-:*:*:*:*:*:*:*", "matchCriteriaId": "79B75CC6-944C-4403-912B-EA58932B6951", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-9w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B401EFE5-F41D-4587-8401-DFA4464A7926", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-9w:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E96DE9-7831-463C-8D08-4D632BBF948C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-7w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90818CE-751B-4DF2-9CCC-0178E7349453", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-7w:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE59D9EE-0CF7-4088-B872-B9B0063DD01C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n por captura-repetici\u00f3n en el controlador de automatizaci\u00f3n de M\u00e1quinas de la serie NJ todos los modelos Versiones 1.48 y anteriores, el controlador de automatizaci\u00f3n de M\u00e1quinas de la serie NX7 todos los modelos Versiones 1.28 y anteriores, el controlador de automatizaci\u00f3n de M\u00e1quinas de la serie NX1 todos los modelos Versiones 1.48 y anteriores, el software de automatizaci\u00f3n \"Sysmac Studio\" todos los modelos Versiones 1. 49 y anteriores, y Terminal Programable (PT) serie NA5-15W/NA5-12W/NA5-9W/NA5-7W modelos Runtime Versiones 1.15 y anteriores, lo que puede permitir a un atacante remoto que pueda analizar la comunicaci\u00f3n entre el controlador afectado y el software de automatizaci\u00f3n \"Sysmac Studio\" y/o un Terminal Programable (PT) acceder al controlador" } ], "id": "CVE-2022-33208", "lastModified": "2024-11-21T07:07:43.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-04T02:15:07.570", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-294" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU97050784/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU97050784/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf | Mitigation, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C32C9A6D-2AF6-4005-AD33-E54B2726A769", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1600:-:*:*:*:*:*:*:*", "matchCriteriaId": "A613C260-184B-4131-B2EC-656D8322F86B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "929C2ED9-5BBD-4585-A95F-A3C5F12C5376", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1700:-:*:*:*:*:*:*:*", "matchCriteriaId": "753A218D-C738-42E5-B523-ED7CACCAEC82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-z700_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B87C2BC4-8CDE-42CA-B0D3-EEBEAD0BCECF", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-z700:-:*:*:*:*:*:*:*", "matchCriteriaId": "36F25E10-A76C-4A16-B72B-4B9E572EDBAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-z600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "586D8ACC-BD51-403C-AAF6-55392741D582", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-z600:-:*:*:*:*:*:*:*", "matchCriteriaId": "90B7C106-4C14-4C0A-BA78-9A3DD63EF576", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67236B5C-8045-4413-8767-1F0904EF6E7F", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*", "matchCriteriaId": "2434BE7E-3E5D-48A9-838C-BCC6055135F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1805212B-75E3-4443-A7D4-B889EA53721A", "versionEndIncluding": "1.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D7FA7-18A3-45B7-976B-9DEDC59294C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91116EDD-1D61-4D78-9367-C78E80E85BE3", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A6528B-2160-4CE4-88B2-EC69DB5797B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEA800B1-6E43-45C8-833E-744831490B98", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E68759-07B1-4F7B-8EF8-0429C8CFCAAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "509A80E2-0FE2-4E65-A276-351953EA403D", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D01F33E2-E10C-4B3F-9326-7022924423DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3A572C4-8EDA-4A4D-9358-9E2313F9D71A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE463BB1-BE67-4D80-8FE7-85F960945AF5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1120_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "960BC2F9-7B36-419A-BEF6-1895666422A2", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "E72347A8-8725-4DAB-9D2C-609072A4E904", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-1020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F70AA8-7DB0-415F-AB71-4F527E930C56", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1A91E22-8F08-4470-BC4A-14D25A827607", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx102-9020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644FC209-89BD-46E5-BD08-1A9518200AF4", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx102-9020:-:*:*:*:*:*:*:*", "matchCriteriaId": "34CE73C8-BF67-4BC3-81B2-275393441C91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1140dt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53B955C2-94EE-4C9A-9858-B38AF619640A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1140dt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFF59B0A-C08C-4D56-B301-631DD155BEF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1140dt1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B73A630B-5A24-459F-80E5-E88C0D3C04BD", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1140dt1:-:*:*:*:*:*:*:*", "matchCriteriaId": "63EEFB13-8B20-4A42-8511-98C4C8E045FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1040dt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29BDE27D-6AFE-459A-B368-4D59BF2112EB", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1040dt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7EF898A-8273-4044-8F4B-B2082294749F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-1040dt1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD05B298-12C5-48B7-814D-62CA3DD6623A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-1040dt1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8DD457B-3E36-4C10-B34F-21CD0B931459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-9024dt_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C0048B2-460B-4795-A23F-B83EC8830900", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-9024dt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B1E7DBC-6211-4503-9154-D0BD0FA3BE95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1p2-9024dt1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB34E3A4-B7AF-461F-BA78-48C496B064D6", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1p2-9024dt1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F193D7DE-97C1-4883-871D-78AC7FCB9B14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-cif01_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2279FB9-11F5-4846-92C9-C657E36D7B02", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-cif01:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9E45E4A-447D-4DE9-AC15-50BD2DEC5AAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-cif11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E1F7962-856D-4C94-A3FE-A14591B5B982", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-cif11:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA6772B4-5B9D-4642-9DA6-5595C92895C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-cif12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60836E6B-91EC-44A7-8FFF-535A32A83986", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-cif12:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD3B3071-1C48-4AD0-9C82-59A16F52944D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-adb21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92D1E782-1625-41E0-81C2-F247628B1081", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-adb21:-:*:*:*:*:*:*:*", "matchCriteriaId": "148C75FA-08F5-401A-B4E9-989ED80AF3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-dab21v_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E6F2CDD-7D0F-480E-9925-8A6F2B1D2825", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-dab21v:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA779FC7-7C37-411C-BFD3-EE9B87E8D861", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nx1w-mab221_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88219CC-5788-4B68-95C7-1D6746CCF5C7", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nx1w-mab221:-:*:*:*:*:*:*:*", "matchCriteriaId": "48E3688A-B3EE-441E-A16A-52FC683D4F1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03C70E33-A661-4974-A0D4-935C6EE1CB7A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD281699-D123-4301-9EDF-4BE249E24FF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-140_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4A80DE2-ECC9-4B35-B999-57573D386581", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-140:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4824951-49CB-4E85-A736-28A72C514FB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD94505F-4294-4BF2-8A2F-13FC419D3D96", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*", "matchCriteriaId": "2917E7F0-DAA8-4D3B-A5E4-FB0ACAEF02C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E01A5FE5-B310-4C46-93FB-A6A8B492E179", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A1BA508-3DBE-46C4-B72C-312AC3403C27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDEDFECF-1490-4B47-BD5A-54F560C80CF4", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r520:-:*:*:*:*:*:*:*", "matchCriteriaId": "36BDD615-7933-4EF5-B2E5-68EB4FA776B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8FB4EB9-6E39-423B-84EF-B97698F896F0", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A453709-E9EE-4DD8-8638-04752B9DFB0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r420_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD6DAE59-9863-44EE-97CC-503B980FB9AA", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r420:-:*:*:*:*:*:*:*", "matchCriteriaId": "C264C95F-F8CE-4EC1-B5A5-71998F0A75C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B4F9EF2-6C73-40AA-AF3B-BCCDFAF92E0A", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r300:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A4809E-770F-4D7B-A532-37160D8A3943", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-r320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84C41F6C-7B86-4823-8214-9C244283C3AE", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "32E135F9-CB75-49AF-B7C3-25E8EA3AB991", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A1EC714-602B-4946-9857-EA601CEE8504", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FEF30DD-FCF0-499E-B5C2-4184C9A7E9D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BA40F4B-9EA2-416C-876C-714927FF9F32", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBBE1648-D428-4A43-831D-AB3AF3F05739", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1420_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F22BED01-FC93-49D6-8623-053EE4327EAB", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*", "matchCriteriaId": "148C6AE8-1480-4822-8E0B-1E8575246878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56A035E5-FBAD-44D1-879E-9C4062DF02B4", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*", "matchCriteriaId": "69D21068-A51D-48B2-BF17-68BC61737EBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-1020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7E91BEB-06D4-4B01-8BC6-B252F299EBB0", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A75CF5D-0ADE-448E-BF3C-8E2C268EE1BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-9020_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CB51A57-B840-4E4E-A970-B95E61B9D325", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*", "matchCriteriaId": "8696CE8A-C041-4EED-888B-36F2E499E67A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-1340_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E7ADA83-1E1B-459C-966C-00DD46B96198", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B381AE4-A769-403A-97FA-14FA5F8122CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E19F9721-B79A-4C5D-8414-86C709D4C292", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E8F99DC-4992-4141-AD76-B8A0A690AD4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7124BF89-F495-4C5D-BBC8-7FFF4F160B1D", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D53224A-F4AE-42D5-9CE6-C46892BD658D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1226F0B5-3300-4A13-B692-62C6DB407810", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB77802D-96CB-49DB-A912-9DB901130F08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4310_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC21723E-18CF-4AC3-9EF7-0DC59D6438DF", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4310:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FDF3ECD-A475-44D1-BF08-B1D60F33D163", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj501-4320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB81B854-8606-4EAB-BCB1-C45AFF315F7F", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*", "matchCriteriaId": "060083B0-E9E5-4694-94AB-3517B4B6E0C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj301-1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9C2854F-BDBC-42CB-AE2C-D2682B285EC1", "versionEndExcluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D279907-5CF4-416F-BE78-300FD52B5B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj301-1100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90EF11A3-0FC3-46C8-9AC7-90A6768149A3", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D92B425-000A-4A85-820E-E16B8AFF06B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7C4F791-6705-4501-AAAD-A08B8731A644", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5A77DA0-B22A-4C26-8E64-6F272CD420A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj101-9000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8EBA4D5-57A7-4AB4-80C8-B3AA0881438B", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3883A8C-C4EC-45F0-B164-0BADFF91E361", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj-pa3001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "902CECE1-A411-43D6-9FE6-C80D92F79909", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj-pa3001:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E4422C-0758-4A41-B3C9-FB239E3440B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:nj-pd3001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F4612C4-A7B2-44CD-8138-18B5A0A537D5", "versionEndIncluding": "1.48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:nj-pd3001:-:*:*:*:*:*:*:*", "matchCriteriaId": "377396A7-4CDD-4768-AA23-A0B063962CC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:sysmac_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0C9C903-58E8-4AAD-9D8B-98EFB3CD5261", "versionEndIncluding": "1.49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-15w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26005582-DD0D-45F3-8FA6-4B1A5DB72B1A", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-15w:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B1DD5F-1260-4FF1-BE5F-42CF2748AA83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-12w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FA1DFB3-0E4A-4864-81E7-505064C6C6E4", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-12w:-:*:*:*:*:*:*:*", "matchCriteriaId": "79B75CC6-944C-4403-912B-EA58932B6951", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-9w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B401EFE5-F41D-4587-8401-DFA4464A7926", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-9w:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E96DE9-7831-463C-8D08-4D632BBF948C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:omron:na5-7w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90818CE-751B-4DF2-9CCC-0178E7349453", "versionEndIncluding": "1.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:omron:na5-7w:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE59D9EE-0CF7-4088-B872-B9B0063DD01C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de uso de credenciales embebidas en el controlador de automatizaci\u00f3n de M\u00e1quinas serie NJ todos los modelos Versiones 1.48 y anteriores, el controlador de automatizaci\u00f3n de M\u00e1quinas serie NX7 todos los modelos Versiones 1.28 y anteriores, el controlador de automatizaci\u00f3n de M\u00e1quinas serie NX1 todos los modelos Versiones 1.48 y anteriores, el software de automatizaci\u00f3n \"Sysmac Studio\" todos los modelos Versiones 1. 49 y anteriores, y Terminal programable (PT) serie NA5-15W/NA5-12W/NA5-9W/NA5-7W modelos Runtime Versiones 1.15 y anteriores, lo que puede permitir a un atacante remoto que haya obtenido con \u00e9xito las credenciales de usuario mediante el an\u00e1lisis del producto afectado acceder al controlador" } ], "id": "CVE-2022-34151", "lastModified": "2024-11-21T07:08:57.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-04T02:15:07.727", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }