First published: Thu Oct 06 2022(Updated: )
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-Programmer | <=9.78 | |
: Omron CX-Programmer: Version 9.78 and prior |
Omron has released an update through their Auto Update Service to fix the reported issues. Omron recommends updating to the latest version: Omron CX-Programmer v9.79 For more information, users should see the Omron release note.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3397 is a vulnerability in OMRON CX-Programmer 9.78 and prior versions, which allows an attacker to execute arbitrary code through an Out-of-Bounds Write.
CVE-2022-3397 has a severity rating of 9.8, which is classified as critical.
OMRON CX-Programmer versions up to and including 9.78 are affected by CVE-2022-3397.
An attacker can exploit CVE-2022-3397 by leveraging the Out-of-Bounds Write vulnerability to execute arbitrary code.
At the time of this advisory, there is no known fix or patch available for CVE-2022-3397. It is recommended to follow the guidance provided by the vendor or the appropriate authorities.