First published: Sat Oct 03 2015(Updated: )
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 rely on cleartext password transmission, which allows remote attackers to obtain sensitive information by sniffing the network during a PLC unlock request.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron SYSMAC CX-Programmer | <=9.5 | |
Omron CJ2H PLC | <=1.4 | |
Omron CJ2 | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0987 is considered a high-severity vulnerability due to the risk of unauthorized access to sensitive information through cleartext password transmission.
To fix CVE-2015-0987, it is recommended to upgrade Omron CX-Programmer to version 9.6 or later, and CJ2M and CJ2H PLC devices to their respective secure versions.
CVE-2015-0987 affects Omron CX-Programmer versions prior to 9.6, CJ2M PLC devices before version 2.1, and CJ2H PLC devices before version 1.5.
CVE-2015-0987 allows remote attackers to perform sniffing attacks to intercept cleartext passwords during PLC unlock requests.
Yes, the vulnerability is significant because it relies on the absence of encryption for password transmission, making it susceptible to interception.