First published: Thu Jan 06 2022(Updated: )
Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-One | <=4.60 | |
Omron CX-One | <=4.60 | |
Omron CX-One |
Omron has released an updated version of CX-One to address the reported vulnerability. The following release is available through the CX-One auto-update service: CX-Server: Version 5.0.29.2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Omron CX-One vulnerability is CVE-2022-21137.
The severity of CVE-2022-21137 is high with a CVSS score of 7.8.
Remote attackers can exploit CVE-2022-21137 by having the target visit a malicious page or open a malicious file.
Omron CX-One versions up to and including 4.60 are affected by CVE-2022-21137.
Yes, references for CVE-2022-21137 can be found at the following links: [Reference 1](https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01), [Reference 2](https://www.zerodayinitiative.com/advisories/ZDI-22-373/), [Reference 3](https://www.zerodayinitiative.com/advisories/ZDI-22-374/).