#VU64875 Authentication Bypass by Capture-replay


Published: 2022-07-04 | Updated: 2022-11-11

Vulnerability identifier: #VU64875

Vulnerability risk: Low

CVSSv3.1: 6.6 [CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-33971

CWE-ID: CWE-294

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
NX7-series Machine Automation Controller
Hardware solutions / Other hardware appliances
NX1-series Machine Automation Controller
Hardware solutions / Other hardware appliances
NJ-series Machine Automation Controller
Hardware solutions / Other hardware appliances

Vendor: Omron

Description

The vulnerability allows a remote user to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote administrator on the local network can bypass authentication process and execute arbitrary code on the target system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

NX7-series Machine Automation Controller: 1.28

NX1-series Machine Automation Controller: 1.48

NJ-series Machine Automation Controller: 1.48


External links
http://www.ia.omron.com/product/vulnerability/OMSR-2022-002_en.pdf
http://jvn.jp/en/vu/JVNVU97050784/index.htmlicsa-22-314-07


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability