Lucene search

K
nvd[email protected]NVD:CVE-2022-31206
HistoryJul 26, 2022 - 10:15 p.m.

CVE-2022-31206

2022-07-2622:15:11
CWE-347
web.nvd.nist.gov
1

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

62.1%

The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC’s runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC’s CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS.

Affected configurations

NVD
Node
omronnx701-1600_firmwareRange<1.29
AND
omronnx701-1600Match-
Node
omronnx701-1620_firmwareRange<1.29
AND
omronnx701-1620Match-
Node
omronnx701-1700_firmwareRange<1.29
AND
omronnx701-1700Match-
Node
omronnx701-1720_firmwareRange<1.29
AND
omronnx701-1720Match-
Node
omronnx701-z600_firmwareRange<1.29
AND
omronnx701-z600Match-
Node
omronnx701-z700_firmwareRange<1.29
AND
omronnx701-z700Match-
Node
omronnj101-1000_firmwareRange<1.49
AND
omronnj101-1000Match-
Node
omronnj101-1020_firmwareRange<1.49
AND
omronnj101-1020Match-
Node
omronnj101-9000_firmwareRange<1.49
AND
omronnj101-9000Match-
Node
omronnj101-9020_firmwareRange<1.49
AND
omronnj101-9020Match-
Node
omronnj301-1100_firmwareRange<1.49
AND
omronnj301-1100Match-
Node
omronnj301-1200_firmwareRange<1.49
AND
omronnj301-1200Match-
Node
omronnj501-1300_firmwareRange<1.49
AND
omronnj501-1300Match-
Node
omronnj501-1320_firmwareRange<1.49
AND
omronnj501-1320Match-
Node
omronnj501-1340_firmwareRange<1.49
AND
omronnj501-1340Match-
Node
omronnj501-1400_firmwareRange<1.49
AND
omronnj501-1400Match-
Node
omronnj501-1420_firmwareRange<1.49
AND
omronnj501-1420Match-
Node
omronnj501-1500_firmwareRange<1.49
AND
omronnj501-1500Match-
Node
omronnj501-1520_firmwareRange<1.49
AND
omronnj501-1520Match-
Node
omronnj501-4300_firmwareRange<1.49
AND
omronnj501-4300Match-
Node
omronnj501-4320_firmwareRange<1.49
AND
omronnj501-4320Match-
Node
omronnj501-4400_firmwareRange<1.49
AND
omronnj501-4400Match-
Node
omronnj501-4500_firmwareRange<1.49
AND
omronnj501-4500Match-
Node
omronnj501-5300_firmwareRange<1.49
AND
omronnj501-5300Match-
Node
omronnj501-5300-1_firmwareRange<1.49
AND
omronnj501-5300-1Match-

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

62.1%

Related for NVD:CVE-2022-31206