First published: Thu Jan 07 2021(Updated: )
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-One | ||
Omron CX-One | ||
Omron Cx-Protocol | ||
Omron CX-Server | ||
Omron CX-Position | ||
Omron CX-One | <=4.60 | |
Omron CX-Position | <=2.52 | |
Omron Cx-flnet | <=2.02 | |
Omron Cx-flnet | <=5.0.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-27257.
The severity of CVE-2020-27257 is high with a CVSS score of 7.8.
Omron CX-One, Omron CX-Position, Omron CX-Protocol, and Omron CX-Server are affected by CVE-2020-27257.
CVE-2020-27257 is a type confusion vulnerability that allows remote attackers to execute arbitrary code on affected installations of Omron CX-One by exploiting a flaw in the parsing of PSW files.
To exploit CVE-2020-27257, the attacker requires the target to visit a malicious page or open a malicious PSW file.