First published: Fri Apr 01 2022(Updated: )
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-Position | <=2.5.3 | |
Omron CX-Position Versions 2.5.3 and prior | ||
Omron has provided Version 2.5.4, which is only available to paying users who use the “Auto Update” function. Please contact Omron technical Support or an Omron representative for specific update information.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26419 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Omron CX-One.
To exploit this vulnerability, the target must visit a malicious page or open a malicious file.
Omron CX-One installations up to and including version 2.5.3 and Omron CX-Position installations are affected.
CVE-2022-26419 has a severity rating of 7.8 (High).
You can find more information about CVE-2022-26419 at the following references: [1] [2] [3]