Path traversal in Omron products - CVE-2024-27121
Published: March 7, 2024
Vulnerability identifier: #VU87209
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-27121
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Machine Automation Controller NJ101
Machine Automation Controller NJ301
Machine Automation Controller NJ501-1
Machine Automation Controller NJ501
Machine Automation Controller NJ501-4
Machine Automation Controller NJ501-5300
Machine Automation Controller NJ501-R
Machine Automation Controller NX1P2
Machine Automation Controller NX102
Machine Automation Controller NX502
Machine Automation Controller NX701
Machine Automation Controller NX-EIP201
Machine Automation Controller NJ101
Machine Automation Controller NJ301
Machine Automation Controller NJ501-1
Machine Automation Controller NJ501
Machine Automation Controller NJ501-4
Machine Automation Controller NJ501-5300
Machine Automation Controller NJ501-R
Machine Automation Controller NX1P2
Machine Automation Controller NX102
Machine Automation Controller NX502
Machine Automation Controller NX701
Machine Automation Controller NX-EIP201
Software vendor:
Omron
Omron
Description
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator can send a specially crafted HTTP request and read arbitrary files on the system, leading to arbitrary code execution.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.