cve-2022-45790
Vulnerability from cvelistv5
Published
2024-01-22 17:22
Modified
2024-11-13 16:53
Summary
Omron FINS memory protection susceptible to bruteforce
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:17:04.118Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-010_en.pdf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-45790",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-25T20:23:52.957365Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T16:53:38.204Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CJ-series and CS-series CPU modules",
          "vendor": "Omron",
          "versions": [
            {
              "lessThan": "1.5",
              "status": "affected",
              "version": "CJ2H 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "2.1",
              "status": "affected",
              "version": "CJ2M 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1",
              "status": "affected",
              "version": "CJ1G 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1",
              "status": "affected",
              "version": "CS1H 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "4.1",
              "status": "affected",
              "version": "CS1G 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.4",
              "status": "affected",
              "version": "CS1D-H 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.3",
              "status": "affected",
              "version": "CP1E-E 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.3",
              "status": "affected",
              "version": "CP1E-N 0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "1.4",
              "status": "affected",
              "version": "CS1D-P 0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic."
            }
          ],
          "value": "The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-629",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-629 Unauthorized Use of Device Resources"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-307",
              "description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-22T17:22:14.476Z",
        "orgId": "12bdf821-1545-4a87-aac5-61670cc6fcef",
        "shortName": "Dragos"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05"
        },
        {
          "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-010_en.pdf"
        },
        {
          "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Omron FINS memory protection susceptible to bruteforce",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "12bdf821-1545-4a87-aac5-61670cc6fcef",
    "assignerShortName": "Dragos",
    "cveId": "CVE-2022-45790",
    "datePublished": "2024-01-22T17:22:14.476Z",
    "dateReserved": "2022-11-22T17:52:43.198Z",
    "dateUpdated": "2024-11-13T16:53:38.204Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-45790\",\"sourceIdentifier\":\"ot-cert@dragos.com\",\"published\":\"2024-01-22T18:15:19.497\",\"lastModified\":\"2024-01-29T16:37:48.967\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic.\"},{\"lang\":\"es\",\"value\":\"El protocolo Omron FINS tiene una funci\u00f3n autenticada para evitar el acceso a regiones de memoria. La autenticaci\u00f3n es susceptible a ataques de fuerza bruta, lo que puede permitir que un adversario obtenga acceso a la memoria protegida. Este acceso puede permitir la sobrescritura de valores, incluida la l\u00f3gica programada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2},{\"source\":\"ot-cert@dragos.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-307\"}]},{\"source\":\"ot-cert@dragos.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-307\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj1g-cpu45p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"9BA67863-FC31-458A-8AD5-792A28922C4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj1g-cpu45p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109CFDF4-B86B-44BC-88CC-D427EAF0730F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj1g-cpu45p-gtc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"6DD21DC8-93C4-4E98-88FA-C107207F19E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj1g-cpu45p-gtc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A08BE49-AD7A-497D-B1C5-351502BEF352\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj1g-cpu44p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"CC632D7A-DAD4-47B6-95E4-AF4ACBE46BA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj1g-cpu44p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD36CBD-E14D-4119-B956-56C035D41988\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj1g-cpu43p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"AC8780E9-379B-421A-A1AF-9E75BB071956\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj1g-cpu43p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA30DF7-E2FA-4FF9-B481-ADFD555D17E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj1g-cpu42p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"59BFE129-33E3-4074-8635-39E721D2B538\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj1g-cpu42p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B79E804-9FCC-4EB5-97E5-DBCFB17D303D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cp1e-e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3\",\"matchCriteriaId\":\"3207ED30-C2E5-4F2F-9F11-BDA3234BE08F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cp1e-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DB26677-9FBC-47F7-9AE0-B81D324144D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cp1e-n_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3\",\"matchCriteriaId\":\"E956A16D-A1A8-482F-AB83-50CD94621974\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cp1e-n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6508C8DD-98BE-4345-AB61-0921029C77BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu68_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"808A5522-4334-4047-BDB4-5D8F069D2619\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu68:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BE3CB2E-33A8-412F-8BA3-2EFE6680ADA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu67_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"AC9C543E-C347-409A-950F-E0D1780A0EAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu67:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34974C09-BD68-470A-9E98-5E4B69F9D0AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu66_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"2B3DF59C-AFB2-46C4-A527-EB6C25BD98F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu66:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F41E672-1296-43F6-A620-F8D62C01F134\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu65_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"BB73A3B1-F169-4759-B201-76F5F01FE47F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu65:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1909B984-6D2B-44A7-AA8E-6619127C17DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu64_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"98D2ABC2-D7F4-484E-AB4A-8C966AB58BD4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu64:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C57458-F47E-4780-90E4-917A43E30642\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu68-eip:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B08AA4C-6F83-4387-A5FD-F49C54D9545F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu68-eip_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"23C13393-3FAE-417F-832C-06C7AF2BE6EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu67-eip_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"A6ECE670-AE37-49DC-AFAC-D0331DF0F969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu67-eip:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4530B900-322D-4B9E-AA34-D63CA546190A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu66-eip_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"C04B80AE-5FF4-49D1-ACEB-07C29D334B9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu66-eip:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51114B75-A8DD-49F4-8AC3-BA46C1D4F89C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu65-eip_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"F9CE4DB2-D18F-43BE-9D1D-0B359AFB6EEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu65-eip:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"871B2A06-6AAC-43DF-AF1A-848E9C804016\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2h-cpu64-eip_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"9A7D8717-DF20-4564-BA47-166C647E06DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2h-cpu64-eip:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2D2A32-4326-4357-A400-EA26B362D821\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu35_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"0B252C48-FBA0-47B6-8EB4-9F6932CCC065\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu35:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"603BAD60-89F1-4EE9-8413-F301DFC91AFF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu34_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"2AFD9940-1757-4CCD-80E6-5D7B6EC678D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu34:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C6982F-75F4-497B-8BF9-DC683304B43D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu33_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"BE6EB28C-1B93-452F-8E42-DE77DC1C8F33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu33:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ED8CAFA-62BB-4AC9-BAEF-C1FD50F57B1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu32_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"982460E1-D03C-42C6-BB4B-985974AB794C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD09E48C-5395-418F-8542-B0C00721CF97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu31_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"94DDE27E-5F33-4CEA-BC34-5A0239714833\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu31:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5B09D3A-E765-46FE-8EAF-9A2FCFA42947\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu15_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"23EEED8D-1C2D-487E-B30A-68CF4B74808C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu15:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"812A58CD-8DF2-4917-8AF7-2175A03CAFCB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu14_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"DBFB2B0B-BA1C-469C-A71D-CA943454CC48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu14:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B928D93E-8AEF-4C3F-B7FD-16FFB657D933\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu13_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"8BC38766-0B79-49B5-AC4A-E3EB42D067F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu13:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC3CAE2B-2362-4BBF-B584-843BEA486724\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu12_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"753970E2-A4F3-473D-B2B7-B4313D42756A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA72EEB-2592-4E9E-BDDE-553A6A5A1CE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-cpu11_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"0DFF3629-1FE4-4F73-8B6C-590A0F649D45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-cpu11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CF6C18-6757-4597-848C-084A3AB4B75A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-md211_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"62865D17-8B09-4A1A-8FC5-E7C6C2CCEB0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-md211:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5CD1EAA-8BA1-4345-B24C-B25BFDE7EB3F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cj2m-md212_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"ADE8E41C-1DEE-4F8F-9F55-DC1C4D24E8E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cj2m-md212:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929D4420-5251-4194-AC7B-B01C0B69D6EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu67s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"8378EF77-5D90-47F9-874E-FC34ECBD99BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu67s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7EEE2E5-D01B-40EF-9719-FAC0F4FCDD1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu65s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"D704B88E-BAAA-453A-9809-0811EAE0CD59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu65s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"924008B4-DB07-4BD8-BF9B-B79BA43CCA6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu44s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"A246336D-EF1F-4F83-B56F-E01FA328F45C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu44s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA01BFBD-F9F4-40EB-A4B9-3666F3631BE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu42s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1\",\"matchCriteriaId\":\"1585EE13-016E-4AB5-8CFC-6CD3B427CC65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu42s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFA03735-670C-4E7A-9404-EB4E9CA81513\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu65p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4\",\"matchCriteriaId\":\"F84828C0-E246-404D-A34C-4842EC380D56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu65p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38224CF8-2691-442D-8F5A-2810F422672A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu67p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4\",\"matchCriteriaId\":\"07297C1B-F842-4DB9-987B-27321DC7F835\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu67p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A59B88E-8866-4387-BA8F-40B2B3FD9155\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu67h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4\",\"matchCriteriaId\":\"255D62C4-59E1-4BFE-8ABF-772D0EF40F87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu67h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC4D6545-B97B-48F8-8741-A3196ED7B7BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1d-cpu65h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4\",\"matchCriteriaId\":\"20E75486-EE1B-4156-9C4A-1C3E03C8D8A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1d-cpu65h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AC4B2B-6ACE-41FB-8B8B-C7FE5E893C71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1h-cpu67h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"22594DFA-EC3E-4B6F-ACA7-1096E456A3CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1h-cpu67h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B58E8E-5CDA-4170-9B7C-56CBBC272C6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1h-cpu66h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"B2FEEBDB-C613-4BDD-A17C-D60C819C4072\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1h-cpu66h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0ED33F2-A78A-4F1F-8A76-E8F626EAEC2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1h-cpu65h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"C7CC9B70-630C-4D1A-9067-ECE6B89750E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1h-cpu65h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68DF2CCE-355A-4336-B412-42439CF4E26F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1h-cpu64h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"189CCAEC-29D2-486E-9A23-8025E6CC584B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1h-cpu64h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F21E5D96-B125-4A25-93DE-A1C51EDB8EDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1h-cpu63h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"231731D4-D5A6-46FD-BFBE-55BD36223D00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1h-cpu63h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"001FD433-8F6F-4C61-A455-AB331EA77138\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1g-cpu45h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"97DFF02C-4C9D-41A9-AE85-EA93157D9AEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1g-cpu45h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A259E70-14D8-4F02-8010-5CCDF1824901\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1g-cpu44h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"480F37B2-88FD-44CB-BB6C-E1A988866473\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1g-cpu44h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA7CA6B-0F47-46B7-B3AD-AE715FEA3879\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1g-cpu43h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"F07852CE-C47A-4F96-A59F-5B8B2F758076\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1g-cpu43h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84076537-1FAD-4AC2-8B7A-241162E60F60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:omron:cs1g-cpu42h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1\",\"matchCriteriaId\":\"7AE8B4FF-0F15-4599-B36A-148944586CDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:omron:cs1g-cpu42h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84973088-08D4-455F-8FFD-208888EB726C\"}]}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05\",\"source\":\"ot-cert@dragos.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/\",\"source\":\"ot-cert@dragos.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-010_en.pdf\",\"source\":\"ot-cert@dragos.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.