Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-45794 (GCVE-0-2022-45794)
Vulnerability from cvelistv5 – Published: 2024-01-10 22:56 – Updated: 2025-05-22 15:46
VLAI?
EPSS
Title
Omron CJ-series and CS-series unauthenticated filesystem access.
Summary
An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.
Severity ?
8.6 (High)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Omron | CJ-series and CS-series CPU modules |
Affected:
0
|
Credits
Reid Wightman of Dragos, Inc.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:17:04.073Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-45794",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-24T18:20:27.535175Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-22T15:46:32.685Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "CJ-series and CS-series CPU modules",
"vendor": "Omron",
"versions": [
{
"status": "affected",
"version": "0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Reid Wightman of Dragos, Inc."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\u003cbr\u003e"
}
],
"value": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-165",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-165 File Manipulation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-22T16:39:10.643Z",
"orgId": "12bdf821-1545-4a87-aac5-61670cc6fcef",
"shortName": "Dragos"
},
"references": [
{
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf"
},
{
"url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Omron CJ-series and CS-series unauthenticated filesystem access.",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "12bdf821-1545-4a87-aac5-61670cc6fcef",
"assignerShortName": "Dragos",
"cveId": "CVE-2022-45794",
"datePublished": "2024-01-10T22:56:58.836Z",
"dateReserved": "2022-11-22T17:52:43.199Z",
"dateUpdated": "2025-05-22T15:46:32.685Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T14:17:04.073Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-45794\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-01-24T18:20:27.535175Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-22T15:46:27.594Z\"}}], \"cna\": {\"title\": \"Omron CJ-series and CS-series unauthenticated filesystem access.\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Reid Wightman of Dragos, Inc.\"}], \"impacts\": [{\"capecId\": \"CAPEC-165\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-165 File Manipulation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Omron\", \"product\": \"CJ-series and CS-series CPU modules\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf\"}, {\"url\": \"https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-306\", \"description\": \"CWE-306 Missing Authentication for Critical Function\"}]}], \"providerMetadata\": {\"orgId\": \"12bdf821-1545-4a87-aac5-61670cc6fcef\", \"shortName\": \"Dragos\", \"dateUpdated\": \"2024-01-22T16:39:10.643Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-45794\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-22T15:46:32.685Z\", \"dateReserved\": \"2022-11-22T17:52:43.199Z\", \"assignerOrgId\": \"12bdf821-1545-4a87-aac5-61670cc6fcef\", \"datePublished\": \"2024-01-10T22:56:58.836Z\", \"assignerShortName\": \"Dragos\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CVE-2022-45794
Vulnerability from fstec - Published: 18.01.2023
VLAI Severity ?
Title
Уязвимость контроллеров автоматизации Omron CS/CJ, связанная с отсутствием аутентификации для критичной функции, позволяющая нарушителю получить доступ к защищаемой информации
Description
Уязвимость контроллеров автоматизации Omron CS/CJ связана с отсутствием аутентификации для критичной функции. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, получить доступ к защищаемой информации
Severity ?
Vendor
Omron Electronics LLC
Software Name
Omron CJ2H, Omron CJ2M, Omron CJ1G, Omron CS1H, Omron CS1G, Omron CS1D
Software Version
- (Omron CJ2H), - (Omron CJ2M), - (Omron CJ1G), - (Omron CS1H), - (Omron CS1G), - (Omron CS1D)
Possible Mitigations
Компенсирующие меры:
- включить функцию защиты от записи FINS;
- ограничение доступа к порту FINS (9600);
- ограничение доступа к устройству из внешних сетей (Интернет);
- использование антивирусного программного обеспечения;
- использование средств межсетевого экранирования для ограничения доступа к устройству;
- сегментирование сети для ограничения доступа к промышленному сегменту из других подсетей;
- использование виртуальных частных сетей для организации удаленного доступа (VPN).
Использование рекомендаций производителя:
https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf
Reference
https://www.cisa.gov/news-events/ics-advisories/icsa-23-108-01
https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf
CWE
CWE-306
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Omron Electronics LLC",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Omron CJ2H), - (Omron CJ2M), - (Omron CJ1G), - (Omron CS1H), - (Omron CS1G), - (Omron CS1D)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0437\u0430\u043f\u0438\u0441\u0438 FINS;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043f\u043e\u0440\u0442\u0443 FINS (9600);\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443 \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442);\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443;\n- \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0443 \u0438\u0437 \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u043e\u0434\u0441\u0435\u0442\u0435\u0439;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "18.01.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.04.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.04.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-02205",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-45794",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Omron CJ2H, Omron CJ2M, Omron CJ1G, Omron CS1H, Omron CS1G, Omron CS1D",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u043e\u0432 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 Omron CS/CJ, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 (CWE-306)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u043e\u0432 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 Omron CS/CJ \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-108-01\nhttps://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-306",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
GHSA-J4XH-QHCF-RPXF
Vulnerability from github – Published: 2024-01-11 00:30 – Updated: 2024-01-11 00:30
VLAI?
Details
An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files form the PLC internal memory and memory card.
Severity ?
8.6 (High)
{
"affected": [],
"aliases": [
"CVE-2022-45794"
],
"database_specific": {
"cwe_ids": [
"CWE-306"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-01-10T23:15:08Z",
"severity": "HIGH"
},
"details": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files form the PLC internal memory and memory card.\n",
"id": "GHSA-j4xh-qhcf-rpxf",
"modified": "2024-01-11T00:30:26Z",
"published": "2024-01-11T00:30:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45794"
},
{
"type": "WEB",
"url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access"
},
{
"type": "WEB",
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2022-45794
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files form the PLC internal memory and memory card.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-45794",
"id": "GSD-2022-45794"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-45794"
],
"details": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files form the PLC internal memory and memory card.\n",
"id": "GSD-2022-45794",
"modified": "2023-12-13T01:19:24.881831Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ot-cert@dragos.com",
"ID": "CVE-2022-45794",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CJ-series and CS-series CPU modules",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"status": "affected",
"version": "0"
}
]
}
}
]
}
}
]
},
"vendor_name": "Omron"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Reid Wightman of Dragos, Inc."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\n"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-306",
"lang": "eng",
"value": "CWE-306 Missing Authentication for Critical Function"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf",
"refsource": "MISC",
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf"
},
{
"name": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/",
"refsource": "MISC",
"url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu64-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88523EAF-E774-4AEE-B6CF-A9E458C21211",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu64-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "217C64FF-ED40-4BF4-9173-C7FB7C980B31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CEA3421-91F4-4F53-B13A-4FA5B014A635",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEA3DDA-E62F-42F0-965B-2E9B16DB776A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu65-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EC0FF9-EFBD-4076-9BFD-3DAB7BDB0556",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu65-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9D440F-91E2-4EAE-9014-0B4C5CBF5BA8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu65_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD9E842-5282-41A1-B829-A7D564FF9DF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu65:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57EE3457-049C-4213-8BB0-45FA75EB3437",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu66-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A61CDE9B-0594-4CC3-8303-C99014090ACE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu66-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "362B1B2D-2EDF-46DB-8910-9A7EAFB085B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu66_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4936F6FF-574D-409A-9373-F96F35F30E3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu66:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36ADF13A-5013-4D2C-A03D-1980CC89FBD3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu67-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AC1B4F-A4AB-4E3E-B267-F1669FC4F138",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu67-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8137B2F0-4B17-473D-A26D-E85C8327FD95",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu67_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A834B2BA-B9A2-4918-9E27-95DCD63CB945",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu67:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD370FA-B783-40C1-9D81-120861D7EFDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu68-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2957DBA4-8A61-4863-A84B-193395100E88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu68-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA17EF1D-53C4-49D7-A161-AA0441EEE23B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu68_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9741EE-11C1-420A-B29C-B62B218DBC5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu68:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D887A60-47E0-42FD-A0E3-047F6D4968C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu11_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "701D7B0E-7E53-4392-A9B9-9C79540F7363",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5BD0D7-D424-4DE3-8D77-B1D11A2800AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu12_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02962BAF-804A-445B-922B-95D671DD22F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4806CEF0-4D86-4BAE-A2BA-7E84FD568514",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu13_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9022B43E-3ED9-4D61-9309-BB8E2FE23C82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu13:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAECE6DE-8A46-4878-869C-DE2C127D8662",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu14_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE64022B-B3F0-43D7-A4EC-19194A888DF7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E174038-B411-4A68-B3C1-E8DCCDCA3640",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu15_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C448B5E-8294-4654-BE16-79AC53809AB2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14B1AF84-4CB8-4973-9097-EA61A2D29B87",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu31_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F379C8-8458-44ED-B693-21886DEB0876",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu31:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8827188B-1E99-408A-AFC1-B55F30E2B23F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu32_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BBCB32-5B16-4E92-8CA9-1B717005D2A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D2CB45D-986A-441F-9B12-2BC754F032D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu33_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDA2235-075C-42E0-88E3-D4649E8DE2D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu33:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5F4A0B-88DC-4EFC-8F8E-30DE4288F926",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu34_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2028144-16ED-4CEB-AA41-5E3D26949A07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu34:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F6A7652-0622-4D88-A375-EAE5CC47D12E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu35_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56015D99-4A3C-4444-8953-2D96D56AF6DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8CDF09-DC6A-4008-8E42-9CCABF5AEE4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu45p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13F55896-AC8C-419F-9D26-330D4C5F822F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu45p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC35BE4-14DC-452C-B63C-99DC997F8F2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu44p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78A9776F-4572-48D7-8711-05C8144B9868",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu44p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F79EE6B2-CDFA-4711-9A43-77BAC3CBC06B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu43p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C20AAA1-E180-42D3-AD4B-F8556108B114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu43p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0035C37-47B4-4DE7-B380-D0907069B1C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu42p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA07F82-21BA-4F7E-B59C-40978F836D2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu42p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACD5BF1F-9B7C-406D-925A-91BEF9364A9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu63h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C280A3-C2A6-4361-B54D-183B0F05BC4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu63h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD9FCA2-631E-406B-B065-448ACCACBB97",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu65h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E80F76E6-B1D0-47E6-93BD-D21CADB0894E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu65h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE8EECB-959E-44BC-BDF9-6895A1C89F6E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu67h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D20F2161-E0AE-4AB7-8A1C-DDE0B20247F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu67h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF0633DC-4EB7-4550-BAC5-C509253F9923",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu64h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "610199BF-30D6-4E5F-A6B9-F366B717E3C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu64h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71C2AFAC-1262-47E9-BA23-5C4664D0607A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu66h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96101FEA-728E-4F01-9A64-5A9E39C93E98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu66h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F84C89-7497-4898-9730-9D3E953C0F05",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu44h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99120036-B5EE-4D45-89CF-A09A05396C44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu44h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6D2A41-9C87-4CD2-86C5-F3001C098828",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu43h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF4E371-D5F2-4464-B195-7D0AAC865BE7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu43h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4725DF23-F2FC-407E-9ABA-96FA3970EE26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu42h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "535ADB56-8CC7-4BB7-A745-89BE5ECF45F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu42h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D809BF0-2C40-4584-9356-F647A1D2D247",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu45h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C0C4BE8-9391-43F9-AE0A-286DA0035D09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu45h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5659A0AD-4608-4A25-96E4-9436D8ABC3EB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu65h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "934D84E3-4A15-4D1D-BE46-510826EE5520",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu65h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E22254B-F09B-48DC-8ED7-F5D17A94C3D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF6EE93C-5BFC-4EAF-9C79-2FD577D8811A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D506BFE-572A-4E7C-B463-247C03EE7E7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu68ha_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "298375A8-CEF5-4D73-9579-9EF72C9D34A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu68ha:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F92FA5B5-8892-45AB-8612-101E9F508125",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67ha_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "400A6B56-3D50-4620-BD24-154AE17B1B81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67ha:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28E97728-B27D-4812-9A8A-7285E259DFAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu65p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13323870-7614-4E66-8E67-15B9B8DBE08B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu65p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77BF5E1D-F8CB-407B-B875-2AF370C40CDE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67sa_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD3294AA-7879-4377-85AA-188B56C6F44F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67sa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "471B13BA-8D94-48BD-BB25-0AB310AA5BD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu44sa_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "767F1FC1-BA09-42E4-9AF8-2CAC877549F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu44sa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2033A661-3F8A-467A-8DF6-D9D104855F93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8610224C-FBFA-456E-88E4-581ECFA9376A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C565EC7-4910-4FE1-92BB-52310F02F7B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"descriptions": [
{
"lang": "en",
"value": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\n"
},
{
"lang": "es",
"value": "Un atacante con acceso a la red del PLC afectado (PLC de las series CJ y CS, todas las versiones) puede utilizar un protocolo de red para leer y escribir archivos desde la memoria interna y la tarjeta de memoria del PLC."
}
],
"id": "CVE-2022-45794",
"lastModified": "2024-01-23T19:34:40.147",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "ot-cert@dragos.com",
"type": "Secondary"
}
]
},
"published": "2024-01-10T23:15:08.397",
"references": [
{
"source": "ot-cert@dragos.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
},
{
"source": "ot-cert@dragos.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf"
}
],
"sourceIdentifier": "ot-cert@dragos.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "ot-cert@dragos.com",
"type": "Secondary"
}
]
}
}
}
}
FKIE_CVE-2022-45794
Vulnerability from fkie_nvd - Published: 2024-01-10 23:15 - Updated: 2024-11-21 07:29
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu64-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88523EAF-E774-4AEE-B6CF-A9E458C21211",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu64-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "217C64FF-ED40-4BF4-9173-C7FB7C980B31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CEA3421-91F4-4F53-B13A-4FA5B014A635",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEA3DDA-E62F-42F0-965B-2E9B16DB776A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu65-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EC0FF9-EFBD-4076-9BFD-3DAB7BDB0556",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu65-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9D440F-91E2-4EAE-9014-0B4C5CBF5BA8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu65_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD9E842-5282-41A1-B829-A7D564FF9DF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu65:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57EE3457-049C-4213-8BB0-45FA75EB3437",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu66-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A61CDE9B-0594-4CC3-8303-C99014090ACE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu66-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "362B1B2D-2EDF-46DB-8910-9A7EAFB085B6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu66_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4936F6FF-574D-409A-9373-F96F35F30E3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu66:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36ADF13A-5013-4D2C-A03D-1980CC89FBD3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu67-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AC1B4F-A4AB-4E3E-B267-F1669FC4F138",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu67-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8137B2F0-4B17-473D-A26D-E85C8327FD95",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu67_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A834B2BA-B9A2-4918-9E27-95DCD63CB945",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu67:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD370FA-B783-40C1-9D81-120861D7EFDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu68-eip_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2957DBA4-8A61-4863-A84B-193395100E88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu68-eip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA17EF1D-53C4-49D7-A161-AA0441EEE23B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2h-cpu68_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9741EE-11C1-420A-B29C-B62B218DBC5F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2h-cpu68:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D887A60-47E0-42FD-A0E3-047F6D4968C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu11_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "701D7B0E-7E53-4392-A9B9-9C79540F7363",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu11:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5BD0D7-D424-4DE3-8D77-B1D11A2800AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu12_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02962BAF-804A-445B-922B-95D671DD22F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4806CEF0-4D86-4BAE-A2BA-7E84FD568514",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu13_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9022B43E-3ED9-4D61-9309-BB8E2FE23C82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu13:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAECE6DE-8A46-4878-869C-DE2C127D8662",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu14_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE64022B-B3F0-43D7-A4EC-19194A888DF7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E174038-B411-4A68-B3C1-E8DCCDCA3640",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu15_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C448B5E-8294-4654-BE16-79AC53809AB2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14B1AF84-4CB8-4973-9097-EA61A2D29B87",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu31_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F379C8-8458-44ED-B693-21886DEB0876",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu31:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8827188B-1E99-408A-AFC1-B55F30E2B23F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu32_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BBCB32-5B16-4E92-8CA9-1B717005D2A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D2CB45D-986A-441F-9B12-2BC754F032D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu33_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDA2235-075C-42E0-88E3-D4649E8DE2D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu33:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5F4A0B-88DC-4EFC-8F8E-30DE4288F926",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu34_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2028144-16ED-4CEB-AA41-5E3D26949A07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu34:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F6A7652-0622-4D88-A375-EAE5CC47D12E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj2m-cpu35_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56015D99-4A3C-4444-8953-2D96D56AF6DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj2m-cpu35:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8CDF09-DC6A-4008-8E42-9CCABF5AEE4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu45p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13F55896-AC8C-419F-9D26-330D4C5F822F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu45p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC35BE4-14DC-452C-B63C-99DC997F8F2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu44p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78A9776F-4572-48D7-8711-05C8144B9868",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu44p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F79EE6B2-CDFA-4711-9A43-77BAC3CBC06B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu43p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C20AAA1-E180-42D3-AD4B-F8556108B114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu43p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0035C37-47B4-4DE7-B380-D0907069B1C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cj1g-cpu42p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA07F82-21BA-4F7E-B59C-40978F836D2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cj1g-cpu42p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACD5BF1F-9B7C-406D-925A-91BEF9364A9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu63h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C280A3-C2A6-4361-B54D-183B0F05BC4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu63h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD9FCA2-631E-406B-B065-448ACCACBB97",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu65h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E80F76E6-B1D0-47E6-93BD-D21CADB0894E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu65h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE8EECB-959E-44BC-BDF9-6895A1C89F6E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu67h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D20F2161-E0AE-4AB7-8A1C-DDE0B20247F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu67h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF0633DC-4EB7-4550-BAC5-C509253F9923",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu64h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "610199BF-30D6-4E5F-A6B9-F366B717E3C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu64h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71C2AFAC-1262-47E9-BA23-5C4664D0607A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1h-cpu66h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96101FEA-728E-4F01-9A64-5A9E39C93E98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1h-cpu66h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F84C89-7497-4898-9730-9D3E953C0F05",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu44h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99120036-B5EE-4D45-89CF-A09A05396C44",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu44h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6D2A41-9C87-4CD2-86C5-F3001C098828",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu43h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF4E371-D5F2-4464-B195-7D0AAC865BE7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu43h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4725DF23-F2FC-407E-9ABA-96FA3970EE26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu42h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "535ADB56-8CC7-4BB7-A745-89BE5ECF45F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu42h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D809BF0-2C40-4584-9356-F647A1D2D247",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1g-cpu45h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C0C4BE8-9391-43F9-AE0A-286DA0035D09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1g-cpu45h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5659A0AD-4608-4A25-96E4-9436D8ABC3EB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu65h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "934D84E3-4A15-4D1D-BE46-510826EE5520",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu65h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E22254B-F09B-48DC-8ED7-F5D17A94C3D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF6EE93C-5BFC-4EAF-9C79-2FD577D8811A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D506BFE-572A-4E7C-B463-247C03EE7E7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu68ha_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "298375A8-CEF5-4D73-9579-9EF72C9D34A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu68ha:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F92FA5B5-8892-45AB-8612-101E9F508125",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67ha_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "400A6B56-3D50-4620-BD24-154AE17B1B81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67ha:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28E97728-B27D-4812-9A8A-7285E259DFAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu65p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13323870-7614-4E66-8E67-15B9B8DBE08B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu65p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77BF5E1D-F8CB-407B-B875-2AF370C40CDE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67sa_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD3294AA-7879-4377-85AA-188B56C6F44F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67sa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "471B13BA-8D94-48BD-BB25-0AB310AA5BD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu44sa_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "767F1FC1-BA09-42E4-9AF8-2CAC877549F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu44sa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2033A661-3F8A-467A-8DF6-D9D104855F93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:omron:sysmac_cs1d-cpu67p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8610224C-FBFA-456E-88E4-581ECFA9376A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:omron:sysmac_cs1d-cpu67p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C565EC7-4910-4FE1-92BB-52310F02F7B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.\n"
},
{
"lang": "es",
"value": "Un atacante con acceso a la red del PLC afectado (PLC de las series CJ y CS, todas las versiones) puede utilizar un protocolo de red para leer y escribir archivos desde la memoria interna y la tarjeta de memoria del PLC."
}
],
"id": "CVE-2022-45794",
"lastModified": "2024-11-21T07:29:43.947",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "ot-cert@dragos.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-01-10T23:15:08.397",
"references": [
{
"source": "ot-cert@dragos.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
},
{
"source": "ot-cert@dragos.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-002_en.pdf"
}
],
"sourceIdentifier": "ot-cert@dragos.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "ot-cert@dragos.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…