First published: Thu Jan 07 2021(Updated: )
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-One | <=4.60 | |
Omron CX-Position | <=2.52 | |
Omron Cx-protocol | <=2.02 | |
Omron Cx-server | <=5.0.28 | |
Omron CX-One | ||
Omron CX-One Versions 4.60 and prior, including the following applications: CX-Protocol Versions 2.02 and prior CX-Server Versions 5.0.28 and prior CX-Position Versions 2.52 and prior | ||
Omron CX-Protocol Versions 2.02 and prior | ||
Omron CX-Server Versions 5.0.28 and prior | ||
Omron CX-Position Versions 2.52 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27259 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Omron CX-One.
CVE-2020-27259 works by exploiting a flaw in the parsing of NCI files in Omron CX-One, allowing remote attackers to execute arbitrary code.
CVE-2020-27259 has a severity rating of 8.8 (high).
Omron CX-One, Omron CX-Position, Omron Cx-protocol, and Omron Cx-server versions up to inclusive 4.60, 2.52, 2.02, and 5.0.28 respectively are affected by CVE-2020-27259.
To mitigate CVE-2020-27259, it is recommended to update to the latest version of the affected software and avoid visiting malicious pages or opening malicious files.