CWE
347 345
Advisory Published
Updated

CVE-2022-31207

First published: Tue Jul 26 2022(Updated: )

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Omron SYSMAC CS1<4.1
4.1
Omron SYSMAC CJ2M<2.1
2.1
Omron SYSMAC CJ2H<1.5
1.5
Omron SYSMAC CP1E/CP1H<1.30
1.30
Omron SYSMAC CP1L<1.10
1.10
Omron CP1W-CIF41
Omron SYSMAC CX-Programmer<9.6
9.6
Omron SYSMAC NJ/NX Series: Versions prior to 1.49 (1.29 for NX7)
Omron Sysmac Cs1 Firmware<4.1
Omron SYSMAC CS1
Omron Sysmac Cj2m Firmware<2.1
Omron SYSMAC CJ2M
Omron Sysmac Cj2h Firmware<1.5
Omron SYSMAC CJ2H
Omron Sysmac Cp1e Firmware<1.30
Omron Sysmac Cp1e
Omron Sysmac Cp1h Firmware<1.30
Omron Sysmac Cp1h
Omron Sysmac Cp1l Firmware<1.10
Omron SYSMAC CP1L
Omron Cp1w-cif41 Firmware
Omron CP1W-CIF41

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2022-31207.

  • What is the severity of CVE-2022-31207?

    CVE-2022-31207 has a severity rating of 9.8 (Critical).

  • Which Omron SYSMAC Cx product family PLCs are affected by CVE-2022-31207?

    The Omron SYSMAC Cx product family PLCs, including CS series, CJ series, and CP series, are affected by CVE-2022-31207.

  • What is the impact of CVE-2022-31207?

    CVE-2022-31207 allows an attacker to perform unauthorized actions on affected Omron SYSMAC Cx PLCs.

  • Are there any known fixes or mitigations for CVE-2022-31207?

    As of now, there are no known fixes or mitigations available for CVE-2022-31207. It is recommended to follow the guidelines provided by the vendor and implement security best practices.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203