var-202207-0036
Vulnerability from variot

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. are all products of Japan's Omron (Omron). A remote attacker could exploit this vulnerability to bypass the authentication process

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0036",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nx1w-cif01",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-5300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1140dt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-1520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-1600",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nj501-r520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-1500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r420",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-15w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nj501-1420",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj-pd3001",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-1020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-9024dt1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-9000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-z600",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx102-1200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-1300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "sysmac studio",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.49"
      },
      {
        "model": "nj501-1320",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4310",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-7w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nj501-140",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-12w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nx102-1020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj301-1100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-mab221",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-1720",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx701-z700",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx701-1620",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx1w-cif12",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1040dt1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-9020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj301-1200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj-pa3001",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-adb21",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4400",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1220",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-9024dt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-cif11",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4320",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-9020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1040dt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-9w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nj501-1340",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1120",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r400",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1140dt1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r320",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-dab21v",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-1700",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 sysmac studio",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "\u30d7\u30ed\u30b0\u30e9\u30de\u30d6\u30eb\u30bf\u30fc\u30df\u30ca\u30eb na \u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nx \u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nj \u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "cve": "CVE-2022-33208",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2022-33208",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-426449",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2022-33208",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2022-002691",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-33208",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2022-002691",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202207-355",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-426449",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2022-33208",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. are all products of Japan\u0027s Omron (Omron). A remote attacker could exploit this vulnerability to bypass the authentication process",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-33208",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVNVU97050784",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691",
        "trust": 1.4
      },
      {
        "db": "USCERT",
        "id": "AA22-103A",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355",
        "trust": 0.7
      },
      {
        "db": "CS-HELP",
        "id": "SB2022070405",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-426449",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "id": "VAR-202207-0036",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:49:43.088000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "machine automation controller \u00a0NJ/NX\u00a0 Authentication Bypass Vulnerability in Communication Function of Series Omron Corporation",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/vulnerability/OMSR-2022-001_ja.pdf"
      },
      {
        "title": "Multiple Omron Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=200205"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-294",
        "trust": 1.1
      },
      {
        "problemtype": "Capture-replay authentication evasion by (CWE-294) [ others ]",
        "trust": 0.8
      },
      {
        "problemtype": " debug code in active state (CWE-489) [ others ]",
        "trust": 0.8
      },
      {
        "problemtype": " Use hard-coded credentials (CWE-798) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://jvn.jp/en/vu/jvnvu97050784/index.html"
      },
      {
        "trust": 1.8,
        "url": "https://www.ia.omron.com/product/vulnerability/omsr-2022-001_en.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu97050784/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34151"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33208"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33971"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-103a"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022070405"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-33208/"
      },
      {
        "trust": 0.6,
        "url": "https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-002691.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/294.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-07-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "date": "2022-07-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "date": "2022-11-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "date": "2022-07-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "date": "2022-07-04T02:15:07.570000",
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-07-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "date": "2022-07-15T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "date": "2022-11-09T08:53:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "date": "2022-11-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "date": "2022-07-15T17:06:55.383000",
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple vulnerabilities in multiple Omron products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.