Multiple vulnerabilities in Omron NJ/NX series Machine Automation Controllers 
Indian - Computer Emergency Response Team (cert-in.org.in)

Severity Rating: HIGH

Software Affected

NX7-series Machine Automation Controller versions prior to 1.28 (All Models)
NX1-series Machine Automation Controller versions prior to 1.48 (All Models)
NJ-series Machine Automation Controller versions prior to 1.48 (All Models)
Automation Software Sysmac Studio versions prior to 1.49 (All Models)
NA-series Programable Terminal Runtime versions prior to 1.15 (NA5-15W, NA5-12W, NA5-9W, NA5-7W)
Overview

Multiple vulnerabilities have been reported in Omron NJ/NX series Machine Automation Controllers products which could allow the attacker to bypass authentication, perform unauthorized access, execute arbitrary code, and cause a denial of service (DoS) condition on the targeted system.

Description

These vulnerabilities exist in Omron NJ/NX series Machine Automation Controllers products due to hard-coded credentials, authentication bypass by capture-replay, and active debug code vulnerabilities. An attacker could exploit these vulnerabilities by analyzing the communication between the controller and the specific software used by Omron internally.
Successful exploitation of these vulnerabilities could allow the attacker to bypass authentication, perform unauthorized access, execute arbitrary code, and cause a denial of service (DoS) condition on the targeted system.

Note: It has been reported that vulnerabilities are being exploited.

Solution

Apply appropriate software updates as mentioned in the Omron Security updates.



Vendor Information

Omron

References

 

CVE Name
CVE-2022-33208
CVE-2022-33971
CVE-2022-34151




About Cert Advisory

We have created this blog to provide latest security advisory from the india cert for the security vulnerability, threats, attacks and patching required to mitigate any kind of cyber attacks.

Related Posts

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top