Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-33687 (GCVE-0-2024-33687)
Vulnerability from cvelistv5 – Published: 2024-06-24 15:03 – Updated: 2025-03-13 14:36
VLAI?
EPSS
Summary
Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.
Severity ?
7.5 (High)
CWE
- Insufficient verification of data authenticity
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| OMRON Corporation | NJ Series CPU Unit |
Affected:
all versions
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-33687",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-24T20:23:44.445669Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-345",
"description": "CWE-345 Insufficient Verification of Data Authenticity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T14:36:56.825Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:36:04.543Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-004_en.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU92504444/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "NJ Series CPU Unit",
"vendor": "OMRON Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
},
{
"product": "NX Series CPU Unit",
"vendor": "OMRON Corporation",
"versions": [
{
"status": "affected",
"version": "all versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Insufficient verification of data authenticity",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-24T15:03:05.467Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-004_en.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU92504444/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-33687",
"datePublished": "2024-06-24T15:03:05.467Z",
"dateReserved": "2024-04-26T07:55:08.563Z",
"dateUpdated": "2025-03-13T14:36:56.825Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-004_en.pdf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jvn.jp/en/vu/JVNVU92504444/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T02:36:04.543Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-33687\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-24T20:23:44.445669Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-345\", \"description\": \"CWE-345 Insufficient Verification of Data Authenticity\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-24T20:26:29.953Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"OMRON Corporation\", \"product\": \"NJ Series CPU Unit\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}]}, {\"vendor\": \"OMRON Corporation\", \"product\": \"NX Series CPU Unit\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions\"}]}], \"references\": [{\"url\": \"https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-004_en.pdf\"}, {\"url\": \"https://jvn.jp/en/vu/JVNVU92504444/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Insufficient verification of data authenticity\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2024-06-24T15:03:05.467Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-33687\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-13T14:36:56.825Z\", \"dateReserved\": \"2024-04-26T07:55:08.563Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2024-06-24T15:03:05.467Z\", \"assignerShortName\": \"jpcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
JVNDB-2024-003242
Vulnerability from jvndb - Published: 2024-05-28 12:28 - Updated:2024-07-26 16:27
Severity ?
Summary
OMRON NJ/NX series vulnerable to insufficient verification of data authenticity
Details
Machine Automation Controller NJ/NX series provided by OMRON Corporation contain an issue with insufficient verification of data authenticity (CWE-345).
OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
References
| Type | URL | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003242.html",
"dc:date": "2024-07-26T16:27+09:00",
"dcterms:issued": "2024-05-28T12:28+09:00",
"dcterms:modified": "2024-07-26T16:27+09:00",
"description": "Machine Automation Controller NJ/NX series provided by OMRON Corporation contain an issue with insufficient verification of data authenticity (CWE-345).\r\n\r\nOMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.",
"link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003242.html",
"sec:cpe": [
{
"#text": "cpe:/a:omron:machine_automation_controller_nj_series",
"@product": "Machine automation controller NJ series",
"@vendor": "OMRON Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/a:omron:machine_automation_controller_nx_series",
"@product": "Machine automation controller NX series",
"@vendor": "OMRON Corporation",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "4.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2024-003242",
"sec:references": [
{
"#text": "https://jvn.jp/en/vu/JVNVU92504444/index.html",
"@id": "JVNVU#92504444",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2024-33687",
"@id": "CVE-2024-33687",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2024-33687",
"@id": "CVE-2024-33687",
"@source": "NVD"
},
{
"#text": "https://cwe.mitre.org/data/definitions/345.html",
"@id": "CWE-345",
"@title": "Insufficient Verification of Data Authenticity(CWE-345)"
}
],
"title": "OMRON NJ/NX series vulnerable to insufficient verification of data authenticity"
}
FKIE_CVE-2024-33687
Vulnerability from fkie_nvd - Published: 2024-06-24 15:15 - Updated: 2025-03-13 15:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj101-1000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F48F82-0457-4C2A-86A2-3E23B03C54C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A77DA0-B22A-4C26-8E64-6F272CD420A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj101-1020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5080EE99-F7FA-4B09-8F98-A7D99D9FEB4D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A75CF5D-0ADE-448E-BF3C-8E2C268EE1BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj101-9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20DA6B5C-BEF1-4B54-90FC-29A4844A93B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3883A8C-C4EC-45F0-B164-0BADFF91E361",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj101-9020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF714AA6-6329-45ED-B470-EA843D3021DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8696CE8A-C041-4EED-888B-36F2E499E67A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj301-1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E0D3610-E91F-407A-BBF9-AE38F1587C84",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D92B425-000A-4A85-820E-E16B8AFF06B8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj301-1200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1922748-E966-4EA6-9E18-C9CD0B0EF377",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D279907-5CF4-416F-BE78-300FD52B5B2D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-1300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EADFDCF4-5A4A-4997-912A-84719A42566A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2917E7F0-DAA8-4D3B-A5E4-FB0ACAEF02C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-1320_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3111B8D-1AE3-444F-9CAF-52DCDE83839B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69D21068-A51D-48B2-BF17-68BC61737EBC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-1340_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77EA35C3-7330-4C24-B5BF-9ACCB21C5B97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B381AE4-A769-403A-97FA-14FA5F8122CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-140_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F90CA15C-80F2-473C-B39C-09A21A3A7105",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4824951-49CB-4E85-A736-28A72C514FB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-1400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1535738D-3EDC-4D69-82F5-D4116BD65019",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-1400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E25F4D25-6ED0-41DD-B202-98F75FA092CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-1420_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F991704-F704-4758-999C-3C228B5E5295",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "148C6AE8-1480-4822-8E0B-1E8575246878",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-1500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0356B5FF-5263-41CF-8B9B-F28445E97391",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD281699-D123-4301-9EDF-4BE249E24FF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-1520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "658B14C7-4DEB-4EE5-BB9A-71FCE52EC298",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBBE1648-D428-4A43-831D-AB3AF3F05739",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-4300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "206C4DDA-753A-4584-9762-ECBDB378335E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB77802D-96CB-49DB-A912-9DB901130F08",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-4310_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E31DA56-8DB7-4B8B-B699-C7656F89ED70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-4310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FDF3ECD-A475-44D1-BF08-B1D60F33D163",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-4320_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42EA2073-E34D-48A2-9AA7-02C247F2F356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "060083B0-E9E5-4694-94AB-3517B4B6E0C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-4400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F3A7B0C-E7F3-416F-A0B0-233FEC0F4F89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D53224A-F4AE-42D5-9CE6-C46892BD658D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-4500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F45D16ED-5CC7-4B06-9FEA-57F42B8B9E93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E8F99DC-4992-4141-AD76-B8A0A690AD4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-5300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6243AD3-C075-4BD5-ABB2-4B7E2D389267",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEF30DD-FCF0-499E-B5C2-4184C9A7E9D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-5300-1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "452BC347-5D07-43B5-87A2-C0BB498A288A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-5300-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5EC53CE-17CD-428E-A750-A323BF5F0ABE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-r300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6968524-3D63-49F5-A318-8AC62049FB4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-r300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A4809E-770F-4D7B-A532-37160D8A3943",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-r320_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4143EFEF-1B06-4C12-BED5-D86915DD62F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-r320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32E135F9-CB75-49AF-B7C3-25E8EA3AB991",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-r400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD74F929-989C-4DA4-B39D-BBC54529F241",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-r400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A453709-E9EE-4DD8-8638-04752B9DFB0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-r420_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA2B390-49D8-4F03-8AA0-1847CE7108A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-r420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C264C95F-F8CE-4EC1-B5A5-71998F0A75C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-r500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1707EFC-D40B-4B27-9FDF-91FC25CD19D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-r500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1BA508-3DBE-46C4-B72C-312AC3403C27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj501-r520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EE8A270-ED27-4629-9786-AAD103F55C03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj501-r520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36BDD615-7933-4EF5-B2E5-68EB4FA776B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj-pa3001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9C8F30-E7D4-41C4-8385-CBE00F507FC4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj-pa3001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E4422C-0758-4A41-B3C9-FB239E3440B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nj-pd3001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76159124-1CE9-4908-BC95-F9186638C6E1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nj-pd3001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "377396A7-4CDD-4768-AA23-A0B063962CC7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-1000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB54650-6133-4FA4-A3B1-EDB0B90C18AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D01F33E2-E10C-4B3F-9326-7022924423DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-1020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B91214D1-290D-4199-B02A-387B9771E8EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-1020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A91E22-8F08-4470-BC4A-14D25A827607",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-1100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5123EE-2568-42B2-88CC-3DF44DE92C53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E68759-07B1-4F7B-8EF8-0429C8CFCAAF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-1120_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D19E1D1-215B-4ADF-BABA-9407B7C9081B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-1120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E72347A8-8725-4DAB-9D2C-609072A4E904",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-1200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9741D38-910E-4FEB-B843-19A70C44ECE2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A6528B-2160-4CE4-88B2-EC69DB5797B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-1220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "929EDFEF-F348-4071-AB5F-03FDAE0C5D9C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-1220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE463BB1-BE67-4D80-8FE7-85F960945AF5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-9000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C80B82AF-14CC-4053-B9DC-D6F85A6A7AD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-9000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9DDB7B-213B-41F3-ABC0-23A4834C3449",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx102-9020_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35FBF42A-F83D-4D91-9DAC-EE7E6D87A40D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx102-9020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34CE73C8-BF67-4BC3-81B2-275393441C91",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1p2-1040dt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "773B8213-8022-4072-BCA2-1523932F6406",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1p2-1040dt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7EF898A-8273-4044-8F4B-B2082294749F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1p2-1040dt1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D41CB601-640B-467A-A0CD-CB148E60BECD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1p2-1040dt1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DD457B-3E36-4C10-B34F-21CD0B931459",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1p2-1140dt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4892B707-7300-4D9C-B0EE-8555B8CA0BE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1p2-1140dt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFF59B0A-C08C-4D56-B301-631DD155BEF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1p2-1140dt1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE9D5AD-FD32-4A6D-8803-DD42F4AEDC26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1p2-1140dt1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63EEFB13-8B20-4A42-8511-98C4C8E045FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1p2-9024dt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE55F43-8915-44DF-9D6D-60A5E641CA40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1p2-9024dt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B1E7DBC-6211-4503-9154-D0BD0FA3BE95",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1p2-9024dt1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C8A4BF-EC67-45DC-A5C5-B64E913DDB59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1p2-9024dt1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F193D7DE-97C1-4883-871D-78AC7FCB9B14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1w-adb21_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A52D6BFF-B924-4906-9EBD-5361FE1A31C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1w-adb21:-:*:*:*:*:*:*:*",
"matchCriteriaId": "148C75FA-08F5-401A-B4E9-989ED80AF3EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1w-cif01_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B718F4-D890-4805-A96E-F6744BBFEE51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1w-cif01:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E45E4A-447D-4DE9-AC15-50BD2DEC5AAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1w-cif11_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A878E8B7-F395-4291-8C0D-9C679C5763D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1w-cif11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6772B4-5B9D-4642-9DA6-5595C92895C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1w-cif12_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "986EFF21-3FEE-498B-9BBC-0554904EC32F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1w-cif12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3B3071-1C48-4AD0-9C82-59A16F52944D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1w-dab21v_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59CCAD9B-BF84-4BDE-A010-6FEA8E02BC1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1w-dab21v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA779FC7-7C37-411C-BFD3-EE9B87E8D861",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx1w-mab221_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68F200C5-CA76-414E-B31B-5A3B45005B40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx1w-mab221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48E3688A-B3EE-441E-A16A-52FC683D4F1D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx701-1600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65BBD8C2-05CD-4D95-8868-FC950B3C5EB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx701-1600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A613C260-184B-4131-B2EC-656D8322F86B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7722B2B-C42E-4DE6-A5EF-93F58407F81C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "210D7FA7-18A3-45B7-976B-9DEDC59294C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx701-1700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED4966C-750E-4B50-AA1E-DCC510E27BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx701-1700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "753A218D-C738-42E5-B523-ED7CACCAEC82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "979C93C8-F43B-466D-B85C-50C96B6A1420",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2434BE7E-3E5D-48A9-838C-BCC6055135F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx701-z600_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAE54224-E502-43DC-8598-E8D1AB9DDD82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx701-z600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90B7C106-4C14-4C0A-BA78-9A3DD63EF576",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:nx701-z700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28A3BECD-254C-4E01-8B43-3FDFDCFCE8F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:nx701-z700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36F25E10-A76C-4A16-B72B-4B9E572EDBAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration."
},
{
"lang": "es",
"value": "Existe un problema de verificaci\u00f3n insuficiente de la autenticidad de los datos en todas las versiones de la CPU serie NJ y en todas las versiones de la CPU serie NX. Si se modifica un programa de usuario en el producto afectado, es posible que el producto no pueda detectar la alteraci\u00f3n."
}
],
"id": "CVE-2024-33687",
"lastModified": "2025-03-13T15:15:43.910",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-06-24T15:15:11.590",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92504444/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-004_en.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU92504444/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-004_en.pdf"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-345"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-345"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-9VQ2-24JP-74CH
Vulnerability from github – Published: 2024-06-24 15:31 – Updated: 2024-06-26 15:31
VLAI?
Details
Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2024-33687"
],
"database_specific": {
"cwe_ids": [
"CWE-345"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-06-24T15:15:11Z",
"severity": "HIGH"
},
"details": "Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.",
"id": "GHSA-9vq2-24jp-74ch",
"modified": "2024-06-26T15:31:01Z",
"published": "2024-06-24T15:31:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33687"
},
{
"type": "WEB",
"url": "https://jvn.jp/en/vu/JVNVU92504444"
},
{
"type": "WEB",
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-004_en.pdf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2024-33687
Vulnerability from gsd - Updated: 2024-04-27 05:02Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-33687"
],
"id": "GSD-2024-33687",
"modified": "2024-04-27T05:02:18.432624Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-33687",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…