CVE-2022-33208 (GCVE-0-2022-33208)

Vulnerability from cvelistv5 – Published: 2022-07-04 01:50 – Updated: 2024-08-03 08:01
VLAI?
Summary
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller.
Severity ?
No CVSS data available.
CWE
  • Authentication Bypass by Capture-replay
Assigner
Impacted products
Vendor Product Version
OMRON Corporation Machine automation controller NJ series, Machine automation controller NX series, Automation software 'Sysmac Studio', and Programmable Terminal (PT) NA series Affected: Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T08:01:20.422Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Machine automation controller NJ series, Machine automation controller NX series, Automation software \u0027Sysmac Studio\u0027, and Programmable Terminal (PT) NA series",
          "vendor": "OMRON Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Authentication Bypass by Capture-replay",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-04T02:25:11",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2022-33208",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Machine automation controller NJ series, Machine automation controller NX series, Automation software \u0027Sysmac Studio\u0027, and Programmable Terminal (PT) NA series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OMRON Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Authentication Bypass by Capture-replay"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf",
              "refsource": "MISC",
              "url": "https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU97050784/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU97050784/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2022-33208",
    "datePublished": "2022-07-04T01:50:44",
    "dateReserved": "2022-06-21T00:00:00",
    "dateUpdated": "2024-08-03T08:01:20.422Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx701-1600_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.28\", \"matchCriteriaId\": \"C32C9A6D-2AF6-4005-AD33-E54B2726A769\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx701-1600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A613C260-184B-4131-B2EC-656D8322F86B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx701-1700_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.28\", \"matchCriteriaId\": \"929C2ED9-5BBD-4585-A95F-A3C5F12C5376\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx701-1700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"753A218D-C738-42E5-B523-ED7CACCAEC82\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx701-z700_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.28\", \"matchCriteriaId\": \"B87C2BC4-8CDE-42CA-B0D3-EEBEAD0BCECF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx701-z700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F25E10-A76C-4A16-B72B-4B9E572EDBAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx701-z600_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.28\", \"matchCriteriaId\": \"586D8ACC-BD51-403C-AAF6-55392741D582\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx701-z600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90B7C106-4C14-4C0A-BA78-9A3DD63EF576\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.28\", \"matchCriteriaId\": \"67236B5C-8045-4413-8767-1F0904EF6E7F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2434BE7E-3E5D-48A9-838C-BCC6055135F9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.28\", \"matchCriteriaId\": \"1805212B-75E3-4443-A7D4-B889EA53721A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"210D7FA7-18A3-45B7-976B-9DEDC59294C7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx102-1200_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"91116EDD-1D61-4D78-9367-C78E80E85BE3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx102-1200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8A6528B-2160-4CE4-88B2-EC69DB5797B4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx102-1100_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"EEA800B1-6E43-45C8-833E-744831490B98\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx102-1100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1E68759-07B1-4F7B-8EF8-0429C8CFCAAF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx102-1000_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"509A80E2-0FE2-4E65-A276-351953EA403D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx102-1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D01F33E2-E10C-4B3F-9326-7022924423DB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx102-1220_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"D3A572C4-8EDA-4A4D-9358-9E2313F9D71A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx102-1220:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE463BB1-BE67-4D80-8FE7-85F960945AF5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx102-1120_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"960BC2F9-7B36-419A-BEF6-1895666422A2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx102-1120:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E72347A8-8725-4DAB-9D2C-609072A4E904\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx102-1020_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"E2F70AA8-7DB0-415F-AB71-4F527E930C56\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx102-1020:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1A91E22-8F08-4470-BC4A-14D25A827607\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx102-9020_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"644FC209-89BD-46E5-BD08-1A9518200AF4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx102-9020:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34CE73C8-BF67-4BC3-81B2-275393441C91\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1p2-1140dt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"53B955C2-94EE-4C9A-9858-B38AF619640A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1p2-1140dt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFF59B0A-C08C-4D56-B301-631DD155BEF4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1p2-1140dt1_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"B73A630B-5A24-459F-80E5-E88C0D3C04BD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1p2-1140dt1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63EEFB13-8B20-4A42-8511-98C4C8E045FA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1p2-1040dt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"29BDE27D-6AFE-459A-B368-4D59BF2112EB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1p2-1040dt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7EF898A-8273-4044-8F4B-B2082294749F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1p2-1040dt1_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"CD05B298-12C5-48B7-814D-62CA3DD6623A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1p2-1040dt1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8DD457B-3E36-4C10-B34F-21CD0B931459\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1p2-9024dt_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"5C0048B2-460B-4795-A23F-B83EC8830900\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1p2-9024dt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B1E7DBC-6211-4503-9154-D0BD0FA3BE95\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1p2-9024dt1_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"BB34E3A4-B7AF-461F-BA78-48C496B064D6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1p2-9024dt1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F193D7DE-97C1-4883-871D-78AC7FCB9B14\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1w-cif01_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"D2279FB9-11F5-4846-92C9-C657E36D7B02\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1w-cif01:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9E45E4A-447D-4DE9-AC15-50BD2DEC5AAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1w-cif11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"0E1F7962-856D-4C94-A3FE-A14591B5B982\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1w-cif11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA6772B4-5B9D-4642-9DA6-5595C92895C4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1w-cif12_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"60836E6B-91EC-44A7-8FFF-535A32A83986\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1w-cif12:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD3B3071-1C48-4AD0-9C82-59A16F52944D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1w-adb21_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"92D1E782-1625-41E0-81C2-F247628B1081\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1w-adb21:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"148C75FA-08F5-401A-B4E9-989ED80AF3EC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1w-dab21v_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"7E6F2CDD-7D0F-480E-9925-8A6F2B1D2825\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1w-dab21v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA779FC7-7C37-411C-BFD3-EE9B87E8D861\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nx1w-mab221_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"F88219CC-5788-4B68-95C7-1D6746CCF5C7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nx1w-mab221:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48E3688A-B3EE-441E-A16A-52FC683D4F1D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-1500_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"03C70E33-A661-4974-A0D4-935C6EE1CB7A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD281699-D123-4301-9EDF-4BE249E24FF8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-140_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"B4A80DE2-ECC9-4B35-B999-57573D386581\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-140:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4824951-49CB-4E85-A736-28A72C514FB3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-1300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"AD94505F-4294-4BF2-8A2F-13FC419D3D96\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2917E7F0-DAA8-4D3B-A5E4-FB0ACAEF02C5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-r500_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"E01A5FE5-B310-4C46-93FB-A6A8B492E179\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-r500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A1BA508-3DBE-46C4-B72C-312AC3403C27\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-r520_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"CDEDFECF-1490-4B47-BD5A-54F560C80CF4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-r520:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36BDD615-7933-4EF5-B2E5-68EB4FA776B7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-r400_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"B8FB4EB9-6E39-423B-84EF-B97698F896F0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-r400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A453709-E9EE-4DD8-8638-04752B9DFB0C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-r420_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"BD6DAE59-9863-44EE-97CC-503B980FB9AA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-r420:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C264C95F-F8CE-4EC1-B5A5-71998F0A75C3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-r300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"1B4F9EF2-6C73-40AA-AF3B-BCCDFAF92E0A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-r300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8A4809E-770F-4D7B-A532-37160D8A3943\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-r320_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"84C41F6C-7B86-4823-8214-9C244283C3AE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-r320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32E135F9-CB75-49AF-B7C3-25E8EA3AB991\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-5300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"6A1EC714-602B-4946-9857-EA601CEE8504\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FEF30DD-FCF0-499E-B5C2-4184C9A7E9D8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-1520_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"2BA40F4B-9EA2-416C-876C-714927FF9F32\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBBE1648-D428-4A43-831D-AB3AF3F05739\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-1420_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"F22BED01-FC93-49D6-8623-053EE4327EAB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"148C6AE8-1480-4822-8E0B-1E8575246878\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-1320_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"56A035E5-FBAD-44D1-879E-9C4062DF02B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69D21068-A51D-48B2-BF17-68BC61737EBC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj101-1020_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"D7E91BEB-06D4-4B01-8BC6-B252F299EBB0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A75CF5D-0ADE-448E-BF3C-8E2C268EE1BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj101-9020_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"1CB51A57-B840-4E4E-A970-B95E61B9D325\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8696CE8A-C041-4EED-888B-36F2E499E67A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-1340_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"1E7ADA83-1E1B-459C-966C-00DD46B96198\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B381AE4-A769-403A-97FA-14FA5F8122CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-4500_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"E19F9721-B79A-4C5D-8414-86C709D4C292\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E8F99DC-4992-4141-AD76-B8A0A690AD4D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-4400_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"7124BF89-F495-4C5D-BBC8-7FFF4F160B1D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D53224A-F4AE-42D5-9CE6-C46892BD658D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-4300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"1226F0B5-3300-4A13-B692-62C6DB407810\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB77802D-96CB-49DB-A912-9DB901130F08\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-4310_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"FC21723E-18CF-4AC3-9EF7-0DC59D6438DF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-4310:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FDF3ECD-A475-44D1-BF08-B1D60F33D163\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj501-4320_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"BB81B854-8606-4EAB-BCB1-C45AFF315F7F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"060083B0-E9E5-4694-94AB-3517B4B6E0C2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj301-1200_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.48\", \"matchCriteriaId\": \"F9C2854F-BDBC-42CB-AE2C-D2682B285EC1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D279907-5CF4-416F-BE78-300FD52B5B2D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj301-1100_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"90EF11A3-0FC3-46C8-9AC7-90A6768149A3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D92B425-000A-4A85-820E-E16B8AFF06B8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj101-1000_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"F7C4F791-6705-4501-AAAD-A08B8731A644\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5A77DA0-B22A-4C26-8E64-6F272CD420A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj101-9000_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"D8EBA4D5-57A7-4AB4-80C8-B3AA0881438B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3883A8C-C4EC-45F0-B164-0BADFF91E361\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj-pa3001_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"902CECE1-A411-43D6-9FE6-C80D92F79909\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj-pa3001:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97E4422C-0758-4A41-B3C9-FB239E3440B6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:nj-pd3001_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.48\", \"matchCriteriaId\": \"7F4612C4-A7B2-44CD-8138-18B5A0A537D5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:nj-pd3001:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"377396A7-4CDD-4768-AA23-A0B063962CC7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:omron:sysmac_studio:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.49\", \"matchCriteriaId\": \"D0C9C903-58E8-4AAD-9D8B-98EFB3CD5261\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:na5-15w_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.15\", \"matchCriteriaId\": \"26005582-DD0D-45F3-8FA6-4B1A5DB72B1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:na5-15w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B1DD5F-1260-4FF1-BE5F-42CF2748AA83\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:na5-12w_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.15\", \"matchCriteriaId\": \"4FA1DFB3-0E4A-4864-81E7-505064C6C6E4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:na5-12w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B75CC6-944C-4403-912B-EA58932B6951\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:na5-9w_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.15\", \"matchCriteriaId\": \"B401EFE5-F41D-4587-8401-DFA4464A7926\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:na5-9w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0E96DE9-7831-463C-8D08-4D632BBF948C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:omron:na5-7w_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.15\", \"matchCriteriaId\": \"D90818CE-751B-4DF2-9CCC-0178E7349453\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:omron:na5-7w:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE59D9EE-0CF7-4088-B872-B9B0063DD01C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de omisi\\u00f3n de autenticaci\\u00f3n por captura-repetici\\u00f3n en el controlador de automatizaci\\u00f3n de M\\u00e1quinas de la serie NJ todos los modelos Versiones 1.48 y anteriores, el controlador de automatizaci\\u00f3n de M\\u00e1quinas de la serie NX7 todos los modelos Versiones 1.28 y anteriores, el controlador de automatizaci\\u00f3n de M\\u00e1quinas de la serie NX1 todos los modelos Versiones 1.48 y anteriores, el software de automatizaci\\u00f3n \\\"Sysmac Studio\\\" todos los modelos Versiones 1. 49 y anteriores, y Terminal Programable (PT) serie NA5-15W/NA5-12W/NA5-9W/NA5-7W modelos Runtime Versiones 1.15 y anteriores, lo que puede permitir a un atacante remoto que pueda analizar la comunicaci\\u00f3n entre el controlador afectado y el software de automatizaci\\u00f3n \\\"Sysmac Studio\\\" y/o un Terminal Programable (PT) acceder al controlador\"}]",
      "id": "CVE-2022-33208",
      "lastModified": "2024-11-21T07:07:43.217",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-07-04T02:15:07.570",
      "references": "[{\"url\": \"https://jvn.jp/en/vu/JVNVU97050784/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/vu/JVNVU97050784/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-294\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-33208\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2022-07-04T02:15:07.570\",\"lastModified\":\"2024-11-21T07:07:43.217\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n por captura-repetici\u00f3n en el controlador de automatizaci\u00f3n de M\u00e1quinas de la serie NJ todos los modelos Versiones 1.48 y anteriores, el controlador de automatizaci\u00f3n de M\u00e1quinas de la serie NX7 todos los modelos Versiones 1.28 y anteriores, el controlador de automatizaci\u00f3n de M\u00e1quinas de la serie NX1 todos los modelos Versiones 1.48 y anteriores, el software de automatizaci\u00f3n \\\"Sysmac Studio\\\" todos los modelos Versiones 1. 49 y anteriores, y Terminal Programable (PT) serie NA5-15W/NA5-12W/NA5-9W/NA5-7W modelos Runtime Versiones 1.15 y anteriores, lo que puede permitir a un atacante remoto que pueda analizar la comunicaci\u00f3n entre el controlador afectado y el software de automatizaci\u00f3n \\\"Sysmac Studio\\\" y/o un Terminal Programable (PT) acceder al controlador\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-294\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx701-1600_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.28\",\"matchCriteriaId\":\"C32C9A6D-2AF6-4005-AD33-E54B2726A769\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx701-1600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A613C260-184B-4131-B2EC-656D8322F86B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx701-1700_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.28\",\"matchCriteriaId\":\"929C2ED9-5BBD-4585-A95F-A3C5F12C5376\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx701-1700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"753A218D-C738-42E5-B523-ED7CACCAEC82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx701-z700_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.28\",\"matchCriteriaId\":\"B87C2BC4-8CDE-42CA-B0D3-EEBEAD0BCECF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx701-z700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F25E10-A76C-4A16-B72B-4B9E572EDBAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx701-z600_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.28\",\"matchCriteriaId\":\"586D8ACC-BD51-403C-AAF6-55392741D582\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx701-z600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B7C106-4C14-4C0A-BA78-9A3DD63EF576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.28\",\"matchCriteriaId\":\"67236B5C-8045-4413-8767-1F0904EF6E7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2434BE7E-3E5D-48A9-838C-BCC6055135F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.28\",\"matchCriteriaId\":\"1805212B-75E3-4443-A7D4-B889EA53721A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"210D7FA7-18A3-45B7-976B-9DEDC59294C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx102-1200_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"91116EDD-1D61-4D78-9367-C78E80E85BE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx102-1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A6528B-2160-4CE4-88B2-EC69DB5797B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx102-1100_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"EEA800B1-6E43-45C8-833E-744831490B98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx102-1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1E68759-07B1-4F7B-8EF8-0429C8CFCAAF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx102-1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"509A80E2-0FE2-4E65-A276-351953EA403D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx102-1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D01F33E2-E10C-4B3F-9326-7022924423DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx102-1220_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"D3A572C4-8EDA-4A4D-9358-9E2313F9D71A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx102-1220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE463BB1-BE67-4D80-8FE7-85F960945AF5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx102-1120_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"960BC2F9-7B36-419A-BEF6-1895666422A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx102-1120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72347A8-8725-4DAB-9D2C-609072A4E904\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx102-1020_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"E2F70AA8-7DB0-415F-AB71-4F527E930C56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx102-1020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1A91E22-8F08-4470-BC4A-14D25A827607\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx102-9020_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"644FC209-89BD-46E5-BD08-1A9518200AF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx102-9020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34CE73C8-BF67-4BC3-81B2-275393441C91\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1p2-1140dt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"53B955C2-94EE-4C9A-9858-B38AF619640A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1p2-1140dt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFF59B0A-C08C-4D56-B301-631DD155BEF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1p2-1140dt1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"B73A630B-5A24-459F-80E5-E88C0D3C04BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1p2-1140dt1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63EEFB13-8B20-4A42-8511-98C4C8E045FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1p2-1040dt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"29BDE27D-6AFE-459A-B368-4D59BF2112EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1p2-1040dt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7EF898A-8273-4044-8F4B-B2082294749F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1p2-1040dt1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"CD05B298-12C5-48B7-814D-62CA3DD6623A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1p2-1040dt1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8DD457B-3E36-4C10-B34F-21CD0B931459\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1p2-9024dt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"5C0048B2-460B-4795-A23F-B83EC8830900\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1p2-9024dt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B1E7DBC-6211-4503-9154-D0BD0FA3BE95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1p2-9024dt1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"BB34E3A4-B7AF-461F-BA78-48C496B064D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1p2-9024dt1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F193D7DE-97C1-4883-871D-78AC7FCB9B14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1w-cif01_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"D2279FB9-11F5-4846-92C9-C657E36D7B02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1w-cif01:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E45E4A-447D-4DE9-AC15-50BD2DEC5AAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1w-cif11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"0E1F7962-856D-4C94-A3FE-A14591B5B982\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1w-cif11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6772B4-5B9D-4642-9DA6-5595C92895C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1w-cif12_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"60836E6B-91EC-44A7-8FFF-535A32A83986\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1w-cif12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3B3071-1C48-4AD0-9C82-59A16F52944D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1w-adb21_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"92D1E782-1625-41E0-81C2-F247628B1081\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1w-adb21:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"148C75FA-08F5-401A-B4E9-989ED80AF3EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1w-dab21v_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"7E6F2CDD-7D0F-480E-9925-8A6F2B1D2825\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1w-dab21v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA779FC7-7C37-411C-BFD3-EE9B87E8D861\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nx1w-mab221_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"F88219CC-5788-4B68-95C7-1D6746CCF5C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nx1w-mab221:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E3688A-B3EE-441E-A16A-52FC683D4F1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-1500_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"03C70E33-A661-4974-A0D4-935C6EE1CB7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD281699-D123-4301-9EDF-4BE249E24FF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-140_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"B4A80DE2-ECC9-4B35-B999-57573D386581\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4824951-49CB-4E85-A736-28A72C514FB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-1300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"AD94505F-4294-4BF2-8A2F-13FC419D3D96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2917E7F0-DAA8-4D3B-A5E4-FB0ACAEF02C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-r500_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"E01A5FE5-B310-4C46-93FB-A6A8B492E179\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-r500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1BA508-3DBE-46C4-B72C-312AC3403C27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-r520_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"CDEDFECF-1490-4B47-BD5A-54F560C80CF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-r520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36BDD615-7933-4EF5-B2E5-68EB4FA776B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-r400_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"B8FB4EB9-6E39-423B-84EF-B97698F896F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-r400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A453709-E9EE-4DD8-8638-04752B9DFB0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-r420_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"BD6DAE59-9863-44EE-97CC-503B980FB9AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-r420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C264C95F-F8CE-4EC1-B5A5-71998F0A75C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-r300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"1B4F9EF2-6C73-40AA-AF3B-BCCDFAF92E0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-r300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A4809E-770F-4D7B-A532-37160D8A3943\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-r320_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"84C41F6C-7B86-4823-8214-9C244283C3AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-r320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E135F9-CB75-49AF-B7C3-25E8EA3AB991\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-5300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"6A1EC714-602B-4946-9857-EA601CEE8504\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FEF30DD-FCF0-499E-B5C2-4184C9A7E9D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-1520_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"2BA40F4B-9EA2-416C-876C-714927FF9F32\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBBE1648-D428-4A43-831D-AB3AF3F05739\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-1420_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"F22BED01-FC93-49D6-8623-053EE4327EAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"148C6AE8-1480-4822-8E0B-1E8575246878\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-1320_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"56A035E5-FBAD-44D1-879E-9C4062DF02B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D21068-A51D-48B2-BF17-68BC61737EBC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj101-1020_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"D7E91BEB-06D4-4B01-8BC6-B252F299EBB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A75CF5D-0ADE-448E-BF3C-8E2C268EE1BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj101-9020_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"1CB51A57-B840-4E4E-A970-B95E61B9D325\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8696CE8A-C041-4EED-888B-36F2E499E67A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-1340_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"1E7ADA83-1E1B-459C-966C-00DD46B96198\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B381AE4-A769-403A-97FA-14FA5F8122CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-4500_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"E19F9721-B79A-4C5D-8414-86C709D4C292\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8F99DC-4992-4141-AD76-B8A0A690AD4D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-4400_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"7124BF89-F495-4C5D-BBC8-7FFF4F160B1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D53224A-F4AE-42D5-9CE6-C46892BD658D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-4300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"1226F0B5-3300-4A13-B692-62C6DB407810\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB77802D-96CB-49DB-A912-9DB901130F08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-4310_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"FC21723E-18CF-4AC3-9EF7-0DC59D6438DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-4310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FDF3ECD-A475-44D1-BF08-B1D60F33D163\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj501-4320_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"BB81B854-8606-4EAB-BCB1-C45AFF315F7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"060083B0-E9E5-4694-94AB-3517B4B6E0C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj301-1200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.48\",\"matchCriteriaId\":\"F9C2854F-BDBC-42CB-AE2C-D2682B285EC1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D279907-5CF4-416F-BE78-300FD52B5B2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj301-1100_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"90EF11A3-0FC3-46C8-9AC7-90A6768149A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D92B425-000A-4A85-820E-E16B8AFF06B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj101-1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"F7C4F791-6705-4501-AAAD-A08B8731A644\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5A77DA0-B22A-4C26-8E64-6F272CD420A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj101-9000_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"D8EBA4D5-57A7-4AB4-80C8-B3AA0881438B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3883A8C-C4EC-45F0-B164-0BADFF91E361\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj-pa3001_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"902CECE1-A411-43D6-9FE6-C80D92F79909\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj-pa3001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E4422C-0758-4A41-B3C9-FB239E3440B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:nj-pd3001_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.48\",\"matchCriteriaId\":\"7F4612C4-A7B2-44CD-8138-18B5A0A537D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:nj-pd3001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"377396A7-4CDD-4768-AA23-A0B063962CC7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:sysmac_studio:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.49\",\"matchCriteriaId\":\"D0C9C903-58E8-4AAD-9D8B-98EFB3CD5261\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:na5-15w_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.15\",\"matchCriteriaId\":\"26005582-DD0D-45F3-8FA6-4B1A5DB72B1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:na5-15w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B1DD5F-1260-4FF1-BE5F-42CF2748AA83\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:na5-12w_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.15\",\"matchCriteriaId\":\"4FA1DFB3-0E4A-4864-81E7-505064C6C6E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:na5-12w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B75CC6-944C-4403-912B-EA58932B6951\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:na5-9w_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.15\",\"matchCriteriaId\":\"B401EFE5-F41D-4587-8401-DFA4464A7926\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:na5-9w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0E96DE9-7831-463C-8D08-4D632BBF948C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:na5-7w_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.15\",\"matchCriteriaId\":\"D90818CE-751B-4DF2-9CCC-0178E7349453\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:na5-7w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE59D9EE-0CF7-4088-B872-B9B0063DD01C\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU97050784/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/vu/JVNVU97050784/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…