"value":"Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program."
"value":"\n\n<p>OMRON has released the following countermeasures for users to implement: </p><ul><li>Enable the hardware switch to prohibit writing UM (DIP switch on front panel of the CPU Unit) </li><li>Set UM read protection password and \u201cProhibit from overwriting to a protected program \u201coption. </li></ul><p>If the countermeasures cannot be applied, OMRON recommends that customers take the following mitigation measures: </p><p>Security measures to prevent unauthorized access: </p><ul><li>If the following products and versions are used, the risk of attacks by an attacker via the network can be reduced by taking the following measures. <ul><li>Enable the FINS write protection function. </li><li>Select the Protect by IP Address </li></ul></li><li>Minimize connection of control systems and equipment to open networks, so that untrusted devices will be unable to access them. </li><li>Implement firewalls (by shutting down unused communications ports, limiting communications hosts, limiting access to FINS port (9600)) and isolate them from the IT network. </li><li>Use a virtual private network (VPN) for remote access to control systems and equipment. </li><li>Use strong passwords and change them frequently. </li><li>Install physical controls so that only authorized personnel can access control systems and equipment. </li><li>Scan virus to ensure safety of any USB drives or similar devices before connecting them to systems and devices. </li><li>Enforce multifactor authentication to all devices with remote access to control systems and equipment whenever possible. </li><li>Anti-virus protection <ul><li>Protect any PC with access to the control system against malware and ensure installation and maintenance of up-to-date commercial grade anti-virus software protection. </li></ul></li><li>Data input and output protection <ul><li>Validation processing such as backup and range check to cope with unintentional modification of input/output data to control systems and devices. </li></ul></li><li>Data recovery <ul><li>Periodical data backup and maintenance to prepare for data loss. </li></ul></li></ul><p>For more information, see Omron\u2019s <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf\">Security Advisory</a>.</p><br>\n\n<br>"
}
],
"value":"\nOMRON has released the following countermeasures for users to implement: \n\n * Enable the hardware switch to prohibit writing UM (DIP switch on front panel of the CPU Unit) \n * Set UM read protection password and \u201cProhibit from overwriting to a protected program \u201coption. \n\n\nIf the countermeasures cannot be applied, OMRON recommends that customers take the following mitigation measures: \n\nSecurity measures to prevent unauthorized access: \n\n * If the following products and versions are used, the risk of attacks by an attacker via the network can be reduced by taking the following measures. * Enable the FINS write protection function. \n * Select the Protect by IP Address \n\n\n\n * Minimize connection of control systems and equipment to open networks, so that untrusted devices will be unable to access them. \u00a0\n * Implement firewalls (by shutting down unused communications ports, limiting communications hosts, limiting access to FINS port (9600)) and isolate them from the IT network. \n * Use a virtual private network (VPN) for remote access to control systems and equipment. \n * Use strong passwords and change them frequently. \n * Install physical controls so that only authorized personnel can access control systems and equipment. \n * Scan virus to ensure safety of any USB drives or similar devices before connecting them to systems and devices. \n * Enforce multifactor authentication to all devices with remote access to control systems and equipment whenever possible. \n * Anti-virus protection * Protect any PC with access to the control system against malware and ensure installation and maintenance of up-to-date commercial grade anti-virus software protection. \n\n\n\n * Data input and output protection * Validation processing such as backup and range check to cope with unintentional modification of input/output data to control systems and devices. \n\n\n\n * Data recovery * Periodical data backup and maintenance to prepare for data loss. \n\n\n\n\n\nFor more information, see Omron\u2019s Security Advisory https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf .\n\n\n\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"Sam Hanson of Dragos reported these vulnerabilities to CISA. "