First published: Thu Oct 06 2022(Updated: )
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-Programmer | <=9.78 | |
: Omron CX-Programmer: Version 9.78 and prior |
Omron has released an update through their Auto Update Service to fix the reported issues. Omron recommends updating to the latest version: Omron CX-Programmer v9.79 For more information, users should see the Omron release note.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OMRON CX-Programmer vulnerability is CVE-2022-3396.
The severity of CVE-2022-3396 is critical with a CVSS score of 9.8.
The affected software for CVE-2022-3396 is OMRON CX-Programmer version 9.78 and prior.
CVE-2022-3396 allows an attacker to execute arbitrary code.
OMRON has not released a fix for CVE-2022-3396. Users should apply mitigation measures as recommended by OMRON and monitor official channels for updates.