mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
235 lines
14 KiB
JSON
235 lines
14 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-0811",
|
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-284 Improper Access Control ",
|
|
"cweId": "CWE-284"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Omron ",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "CJ1M SYSMAC CJ-series",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "CJ1M SYSMAC CS-series ",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"vendor_name": "Omron",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "CJ1M SYSMAC CJ-series",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "CJ1M SYSMAC CS-series ",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "CJ1M SYSMAC CP-series",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "All versions "
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-01",
|
|
"refsource": "MISC",
|
|
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-01"
|
|
},
|
|
{
|
|
"url": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf",
|
|
"refsource": "MISC",
|
|
"name": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"work_around": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "\n\n<p>OMRON has released the following countermeasures for users to implement: </p><ul><li>Enable the hardware switch to prohibit writing UM (DIP switch on front panel of the CPU Unit) </li><li>Set UM read protection password and \u201cProhibit from overwriting to a protected program \u201coption. </li></ul><p>If the countermeasures cannot be applied, OMRON recommends that customers take the following mitigation measures: </p><p>Security measures to prevent unauthorized access: </p><ul><li>If the following products and versions are used, the risk of attacks by an attacker via the network can be reduced by taking the following measures. <ul><li>Enable the FINS write protection function. </li><li>Select the Protect by IP Address </li></ul></li><li>Minimize connection of control systems and equipment to open networks, so that untrusted devices will be unable to access them. </li><li>Implement firewalls (by shutting down unused communications ports, limiting communications hosts, limiting access to FINS port (9600)) and isolate them from the IT network. </li><li>Use a virtual private network (VPN) for remote access to control systems and equipment. </li><li>Use strong passwords and change them frequently. </li><li>Install physical controls so that only authorized personnel can access control systems and equipment. </li><li>Scan virus to ensure safety of any USB drives or similar devices before connecting them to systems and devices. </li><li>Enforce multifactor authentication to all devices with remote access to control systems and equipment whenever possible. </li><li>Anti-virus protection <ul><li>Protect any PC with access to the control system against malware and ensure installation and maintenance of up-to-date commercial grade anti-virus software protection. </li></ul></li><li>Data input and output protection <ul><li>Validation processing such as backup and range check to cope with unintentional modification of input/output data to control systems and devices. </li></ul></li><li>Data recovery <ul><li>Periodical data backup and maintenance to prepare for data loss. </li></ul></li></ul><p>For more information, see Omron\u2019s <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf\">Security Advisory</a>.</p><br>\n\n<br>"
|
|
}
|
|
],
|
|
"value": "\nOMRON has released the following countermeasures for users to implement: \n\n * Enable the hardware switch to prohibit writing UM (DIP switch on front panel of the CPU Unit) \n * Set UM read protection password and \u201cProhibit from overwriting to a protected program \u201coption. \n\n\nIf the countermeasures cannot be applied, OMRON recommends that customers take the following mitigation measures: \n\nSecurity measures to prevent unauthorized access: \n\n * If the following products and versions are used, the risk of attacks by an attacker via the network can be reduced by taking the following measures. * Enable the FINS write protection function. \n * Select the Protect by IP Address \n\n\n\n * Minimize connection of control systems and equipment to open networks, so that untrusted devices will be unable to access them. \u00a0\n * Implement firewalls (by shutting down unused communications ports, limiting communications hosts, limiting access to FINS port (9600)) and isolate them from the IT network. \n * Use a virtual private network (VPN) for remote access to control systems and equipment. \n * Use strong passwords and change them frequently. \n * Install physical controls so that only authorized personnel can access control systems and equipment. \n * Scan virus to ensure safety of any USB drives or similar devices before connecting them to systems and devices. \n * Enforce multifactor authentication to all devices with remote access to control systems and equipment whenever possible. \n * Anti-virus protection * Protect any PC with access to the control system against malware and ensure installation and maintenance of up-to-date commercial grade anti-virus software protection. \n\n\n\n * Data input and output protection * Validation processing such as backup and range check to cope with unintentional modification of input/output data to control systems and devices. \n\n\n\n * Data recovery * Periodical data backup and maintenance to prepare for data loss. \n\n\n\n\n\nFor more information, see Omron\u2019s Security Advisory https://www.ia.omron.com/product/vulnerability/OMSR-2023-001_en.pdf .\n\n\n\n\n\n"
|
|
}
|
|
],
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Sam Hanson of Dragos reported these vulnerabilities to CISA. "
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.1,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |