First published: Thu Jan 07 2021(Updated: )
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-One | <=4.60 | |
Omron CX-Position | <=2.52 | |
Omron Cx-protocol | <=2.02 | |
Omron Cx-server | <=5.0.28 | |
Omron CX-One | ||
Omron CX-One Versions 4.60 and prior, including the following applications: CX-Protocol Versions 2.02 and prior CX-Server Versions 5.0.28 and prior CX-Position Versions 2.52 and prior | ||
Omron CX-Protocol Versions 2.02 and prior | ||
Omron CX-Server Versions 5.0.28 and prior | ||
Omron CX-Position Versions 2.52 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-27257.
The severity of CVE-2020-27257 is high with a CVSS score of 7.8.
Omron CX-One, Omron CX-Position, Omron CX-Protocol, and Omron CX-Server are affected by CVE-2020-27257.
CVE-2020-27257 is a type confusion vulnerability that allows remote attackers to execute arbitrary code on affected installations of Omron CX-One by exploiting a flaw in the parsing of PSW files.
To exploit CVE-2020-27257, the attacker requires the target to visit a malicious page or open a malicious PSW file.