Multiple vulnerabilities in Omron SYSMAC CS/CJ/CP Series and NJ/NX Series



Published: 2022-06-29
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-31204
CVE-2022-31207
CVE-2022-31206
CWE-ID CWE-319
CWE-345
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SYSMAC CS1
Hardware solutions / Routers & switches, VoIP, GSM, etc

SYSMAC CJ2M
Hardware solutions / Routers & switches, VoIP, GSM, etc

SYSMAC CJ2H
Hardware solutions / Routers & switches, VoIP, GSM, etc

SYSMAC CP1E
Hardware solutions / Routers & switches, VoIP, GSM, etc

SYSMAC CP1H
Hardware solutions / Routers & switches, VoIP, GSM, etc

SYSMAC CP1L
Hardware solutions / Routers & switches, VoIP, GSM, etc

SYSMAC NJ Series
Hardware solutions / Routers & switches, VoIP, GSM, etc

SYSMAC NX Series
Hardware solutions / Routers & switches, VoIP, GSM, etc

CX-Programmer
Server applications / Application servers

Vendor

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Cleartext transmission of sensitive information

EUVDB-ID: #VU64800

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-31204

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker with ability to intercept network traffic can gain access to sensitive data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SYSMAC CS1: before 4.1

SYSMAC CJ2M: before 2.1

SYSMAC CJ2H: before 1.5

SYSMAC CP1E: before 1.30

SYSMAC CP1H: before 1.30

SYSMAC CP1L: before 1.10

CX-Programmer: before 9.6

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-179-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Insufficient verification of data authenticity

EUVDB-ID: #VU64802

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-31207

CWE-ID: CWE-345 - Insufficient Verification of Data Authenticity

Exploit availability: No

Description

The vulnerability allows a remote user to compromsie the target system.

The vulnerability exists due to the logic that is downloaded to the PLC is not cryptographically authenticated. A remote administrator can execute arbitrary object code commands on the defined software logic.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SYSMAC CS1: before 4.1

SYSMAC CJ2M: before 2.1

SYSMAC CJ2H: before 1.5

SYSMAC CP1E: before 1.30

SYSMAC CP1H: before 1.30

SYSMAC CP1L: before 1.10

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-179-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Insufficient verification of data authenticity

EUVDB-ID: #VU64803

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-31206

CWE-ID: CWE-345 - Insufficient Verification of Data Authenticity

Exploit availability: No

Description

The vulnerability allows a remote user to compromsie the target system.

The vulnerability exists due to the logic that is downloaded to the PLC is not cryptographically authenticated. A remote administrator can manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SYSMAC NJ Series: before 1.49

SYSMAC NX Series: before 1.49

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-179-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###