Lucene search

K
cve[email protected]CVE-2022-31207
HistoryJul 26, 2022 - 10:15 p.m.

CVE-2022-31207

2022-07-2622:15:11
CWE-347
web.nvd.nist.gov
47
3
omron
sysmac
cx
plc
cryptographic authentication
fins protocol
authentication flaws
object code
asic
microprocessor

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.3%

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.

Affected configurations

NVD
Node
omronsysmac_cs1_firmwareRange<4.1
AND
omronsysmac_cs1Match-
Node
omronsysmac_cj2m_firmwareRange<2.1
AND
omronsysmac_cj2mMatch-
Node
omronsysmac_cj2h_firmwareRange<1.5
AND
omronsysmac_cj2hMatch-
Node
omronsysmac_cp1e_firmwareRange<1.30
AND
omronsysmac_cp1eMatch-
Node
omronsysmac_cp1h_firmwareRange<1.30
AND
omronsysmac_cp1hMatch-
Node
omronsysmac_cp1l_firmwareRange<1.10
AND
omronsysmac_cp1lMatch-
Node
omroncp1w-cif41_firmwareMatch-
AND
omroncp1w-cif41Match-

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.3%

Related for CVE-2022-31207