Lucene search

K
cve[email protected]CVE-2022-33208
HistoryJul 04, 2022 - 2:15 a.m.

CVE-2022-33208

2022-07-0402:15:07
CWE-294
web.nvd.nist.gov
37
8
cve-2022-33208
authentication bypass
machine automation
sysmac studio
vulnerability
nvd
capture-replay

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.1%

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software ‘Sysmac Studio’ all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software ‘Sysmac Studio’ and/or a Programmable Terminal (PT) to access the controller.

Affected configurations

NVD
Node
omronnx701-1600_firmwareRange1.28
AND
omronnx701-1600Match-
Node
omronnx701-1700_firmwareRange1.28
AND
omronnx701-1700Match-
Node
omronnx701-z700_firmwareRange1.28
AND
omronnx701-z700Match-
Node
omronnx701-z600_firmwareRange1.28
AND
omronnx701-z600Match-
Node
omronnx701-1720_firmwareRange1.28
AND
omronnx701-1720Match-
Node
omronnx701-1620_firmwareRange1.28
AND
omronnx701-1620Match-
Node
omronnx102-1200_firmwareRange1.48
AND
omronnx102-1200Match-
Node
omronnx102-1100_firmwareRange1.48
AND
omronnx102-1100Match-
Node
omronnx102-1000_firmwareRange1.48
AND
omronnx102-1000Match-
Node
omronnx102-1220_firmwareRange1.48
AND
omronnx102-1220Match-
Node
omronnx102-1120_firmwareRange1.48
AND
omronnx102-1120Match-
Node
omronnx102-1020_firmwareRange1.48
AND
omronnx102-1020Match-
Node
omronnx102-9020_firmwareRange1.48
AND
omronnx102-9020Match-
Node
omronnx1p2-1140dt_firmwareRange1.48
AND
omronnx1p2-1140dtMatch-
Node
omronnx1p2-1140dt1_firmwareRange1.48
AND
omronnx1p2-1140dt1Match-
Node
omronnx1p2-1040dt_firmwareRange1.48
AND
omronnx1p2-1040dtMatch-
Node
omronnx1p2-1040dt1_firmwareRange1.48
AND
omronnx1p2-1040dt1Match-
Node
omronnx1p2-9024dt_firmwareRange1.48
AND
omronnx1p2-9024dtMatch-
Node
omronnx1p2-9024dt1_firmwareRange1.48
AND
omronnx1p2-9024dt1Match-
Node
omronnx1w-cif01_firmwareRange1.48
AND
omronnx1w-cif01Match-
Node
omronnx1w-cif11_firmwareRange1.48
AND
omronnx1w-cif11Match-
Node
omronnx1w-cif12_firmwareRange1.48
AND
omronnx1w-cif12Match-
Node
omronnx1w-adb21_firmwareRange1.48
AND
omronnx1w-adb21Match-
Node
omronnx1w-dab21v_firmwareRange1.48
AND
omronnx1w-dab21vMatch-
Node
omronnx1w-mab221_firmwareRange1.48
AND
omronnx1w-mab221Match-
Node
omronnj501-1500_firmwareRange1.48
AND
omronnj501-1500Match-
Node
omronnj501-140_firmwareRange1.48
AND
omronnj501-140Match-
Node
omronnj501-1300_firmwareRange1.48
AND
omronnj501-1300Match-
Node
omronnj501-r500_firmwareRange1.48
AND
omronnj501-r500Match-
Node
omronnj501-r520_firmwareRange1.48
AND
omronnj501-r520Match-
Node
omronnj501-r400_firmwareRange1.48
AND
omronnj501-r400Match-
Node
omronnj501-r420_firmwareRange1.48
AND
omronnj501-r420Match-
Node
omronnj501-r300_firmwareRange1.48
AND
omronnj501-r300Match-
Node
omronnj501-r320_firmwareRange1.48
AND
omronnj501-r320Match-
Node
omronnj501-5300_firmwareRange1.48
AND
omronnj501-5300Match-
Node
omronnj501-1520_firmwareRange1.48
AND
omronnj501-1520Match-
Node
omronnj501-1420_firmwareRange1.48
AND
omronnj501-1420Match-
Node
omronnj501-1320_firmwareRange1.48
AND
omronnj501-1320Match-
Node
omronnj101-1020_firmwareRange1.48
AND
omronnj101-1020Match-
Node
omronnj101-9020_firmwareRange1.48
AND
omronnj101-9020Match-
Node
omronnj501-1340_firmwareRange1.48
AND
omronnj501-1340Match-
Node
omronnj501-4500_firmwareRange1.48
AND
omronnj501-4500Match-
Node
omronnj501-4400_firmwareRange1.48
AND
omronnj501-4400Match-
Node
omronnj501-4300_firmwareRange1.48
AND
omronnj501-4300Match-
Node
omronnj501-4310_firmwareRange1.48
AND
omronnj501-4310Match-
Node
omronnj501-4320_firmwareRange1.48
AND
omronnj501-4320Match-
Node
omronnj301-1200_firmwareRange<1.48
AND
omronnj301-1200Match-
Node
omronnj301-1100_firmwareRange1.48
AND
omronnj301-1100Match-
Node
omronnj101-1000_firmwareRange1.48
AND
omronnj101-1000Match-
Node
omronnj101-9000_firmwareRange1.48
AND
omronnj101-9000Match-
Node
omronnj-pa3001_firmwareRange1.48
AND
omronnj-pa3001Match-
Node
omronnj-pd3001_firmwareRange1.48
AND
omronnj-pd3001Match-
Node
omronsysmac_studioRange1.49
Node
omronna5-15w_firmwareRange1.15
AND
omronna5-15wMatch-
Node
omronna5-12w_firmwareRange1.15
AND
omronna5-12wMatch-
Node
omronna5-9w_firmwareRange1.15
AND
omronna5-9wMatch-
Node
omronna5-7w_firmwareRange1.15
AND
omronna5-7wMatch-

CNA Affected

[
  {
    "product": "Machine automation controller NJ series, Machine automation controller NX series, Automation software 'Sysmac Studio', and Programmable Terminal (PT) NA series",
    "vendor": "OMRON Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier"
      }
    ]
  }
]

Social References

More

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.1%

Related for CVE-2022-33208