cvelist/2023/0xxx/CVE-2023-0811.json

235 lines
14 KiB
JSON
Raw Normal View History

2023-02-13 16:00:38 +00:00
{
2023-03-16 18:00:35 +00:00
"data_version": "4.0",
2023-02-13 16:00:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0811",
2023-03-16 18:00:35 +00:00
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
2023-02-13 16:00:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-03-16 18:00:35 +00:00
"value": "Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control ",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Omron ",
"product": {
"product_data": [
{
"product_name": "CJ1M SYSMAC CJ-series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All versions "
}
]
}
},
{
"product_name": "CJ1M SYSMAC CS-series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
}
]
}
}
]
}
},
{
"vendor_name": "Omron",
"product": {
"product_data": [
{
"product_name": "CJ1M SYSMAC CJ-series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
}
]
}
},
{
"product_name": "CJ1M SYSMAC CS-series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All versions "
}
]
}
},
{
"product_name": "CJ1M SYSMAC CP-series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
},
{
"version_affected": "=",
"version_value": "All versions "
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-01",
"refsource": "MISC",
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-01"
},
{
"url": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf",
"refsource": "MISC",
"name": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<p>OMRON has released the following countermeasures for users to implement: </p><ul><li>Enable the hardware switch to prohibit writing UM (DIP switch on front panel of the CPU Unit) </li><li>Set UM read protection password and \u201cProhibit from overwriting to a protected program \u201coption. </li></ul><p>If the countermeasures cannot be applied, OMRON recommends that customers take the following mitigation measures: </p><p>Security measures to prevent unauthorized access: </p><ul><li>If the following products and versions are used, the risk of attacks by an attacker via the network can be reduced by taking the following measures. <ul><li>Enable the FINS write protection function. </li><li>Select the Protect by IP Address </li></ul></li><li>Minimize connection of control systems and equipment to open networks, so that untrusted devices will be unable to access them. &nbsp;</li><li>Implement firewalls (by shutting down unused communications ports, limiting communications hosts, limiting access to FINS port (9600)) and isolate them from the IT network. </li><li>Use a virtual private network (VPN) for remote access to control systems and equipment. </li><li>Use strong passwords and change them frequently. </li><li>Install physical controls so that only authorized personnel can access control systems and equipment. </li><li>Scan virus to ensure safety of any USB drives or similar devices before connecting them to systems and devices. </li><li>Enforce multifactor authentication to all devices with remote access to control systems and equipment whenever possible. </li><li>Anti-virus protection <ul><li>Protect any PC with access to the control system against malware and ensure installation and maintenance of up-to-date commercial grade anti-virus software protection. </li></ul></li><li>Data input and output protection <ul><li>Validation processing such as backup and range check to cope with unintentional modification of input/output data to control systems and devices. </li></ul></li><li>Data recovery <ul><li>Periodical data backup and maintenance to prepare for data loss. </li></ul></li></ul><p>For more information, see Omron\u2019s <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf\">Security Advisory</a>.</p><br>\n\n<br>"
}
],
"value": "\nOMRON has released the following countermeasures for users to implement: \n\n * Enable the hardware switch to prohibit writing UM (DIP switch on front panel of the CPU Unit) \n * Set UM read protection password and \u201cProhibit from overwriting to a protected program \u201coption. \n\n\nIf the countermeasures cannot be applied, OMRON recommends that customers take the following mitigation measures: \n\nSecurity measures to prevent unauthorized access: \n\n * If the following products and versions are used, the risk of attacks by an attacker via the network can be reduced by taking the following measures. * Enable the FINS write protection function. \n * Select the Protect by IP Address \n\n\n\n * Minimize connection of control systems and equipment to open networks, so that untrusted devices will be unable to access them. \u00a0\n * Implement firewalls (by shutting down unused communications ports, limiting communications hosts, limiting access to FINS port (9600)) and isolate them from the IT network. \n * Use a virtual private network (VPN) for remote access to control systems and equipment. \n * Use strong passwords and change them frequently. \n * Install physical controls so that only authorized personnel can access control systems and equipment. \n * Scan virus to ensure safety of any USB drives or similar devices before connecting them to systems and devices. \n * Enforce multifactor authentication to all devices with remote access to control systems and equipment whenever possible. \n * Anti-virus protection * Protect any PC with access to the control system against malware and ensure installation and maintenance of up-to-date commercial grade anti-virus software protection. \n\n\n\n * Data input and output protection * Validation processing such as backup and range check to cope with unintentional modification of input/output data to control systems and devices. \n\n\n\n * Data recovery * Periodical data backup and maintenance to prepare for data loss. \n\n\n\n\n\nFor more information, see Omron\u2019s Security Advisory https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf .\n\n\n\n\n\n"
}
],
"credits": [
{
"lang": "en",
"value": "Sam Hanson of Dragos reported these vulnerabilities to CISA. "
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
2023-02-13 16:00:38 +00:00
}
]
}
}