Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-31207

Опубликовано: 26 июл. 2022
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpreta

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:omron:sysmac_cs1_firmware:*:*:*:*:*:*:*:*
Версия до 4.1 (исключая)
cpe:2.3:h:omron:sysmac_cs1:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:omron:sysmac_cj2m_firmware:*:*:*:*:*:*:*:*
Версия до 2.1 (исключая)
cpe:2.3:h:omron:sysmac_cj2m:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:omron:sysmac_cj2h_firmware:*:*:*:*:*:*:*:*
Версия до 1.5 (исключая)
cpe:2.3:h:omron:sysmac_cj2h:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:omron:sysmac_cp1e_firmware:*:*:*:*:*:*:*:*
Версия до 1.30 (исключая)
cpe:2.3:h:omron:sysmac_cp1e:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:omron:sysmac_cp1h_firmware:*:*:*:*:*:*:*:*
Версия до 1.30 (исключая)
cpe:2.3:h:omron:sysmac_cp1h:-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:omron:sysmac_cp1l_firmware:*:*:*:*:*:*:*:*
Версия до 1.10 (исключая)
cpe:2.3:h:omron:sysmac_cp1l:-:*:*:*:*:*:*:*
Конфигурация 7

Одновременно

cpe:2.3:o:omron:cp1w-cif41_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:omron:cp1w-cif41:-:*:*:*:*:*:*:*

EPSS

Процентиль: 26%
0.00091
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpr...

EPSS

Процентиль: 26%
0.00091
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-347