First published: Tue Feb 09 2021(Updated: )
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-One | <=4.60 | |
Omron CX-Position | <=2.52 | |
Omron Cx-protocol | <=2.02 | |
Omron Cx-server | <=5.0.28 | |
Omron CX-One | ||
Omron CX-One Versions 4.60 and prior, including the following applications: CX-Protocol Versions 2.02 and prior CX-Server Versions 5.0.28 and prior CX-Position Versions 2.52 and prior | ||
Omron CX-Protocol Versions 2.02 and prior | ||
Omron CX-Server Versions 5.0.28 and prior | ||
Omron CX-Position Versions 2.52 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27261 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Omron CX-One.
The CVE-2020-27261 vulnerability requires user interaction, such as visiting a malicious page or opening a malicious file, to be exploited.
The CVE-2020-27261 vulnerability affects installations of Omron CX-One, Omron CX-Position, Omron Cx-protocol, and Omron Cx-server.
CVE-2020-27261 has a severity rating of 8.8 (High).
It is recommended to apply the necessary updates and security patches provided by Omron to mitigate the vulnerability.