mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
772 lines
22 KiB
JSON
772 lines
22 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2022-31206",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2022-07-26T22:15:11.400",
|
||
|
"lastModified": "2022-08-04T15:01:04.207",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Los PLC de la familia de productos SYSMAC Nx de Omron (series NJ, NY, NX y PMAC) versiones hasta 18-05-2022, carecen de autenticaci\u00f3n criptogr\u00e1fica. Estos PLC son programados usando el software de ingenier\u00eda SYMAC Studio (que compila el c\u00f3digo POU conforme a la norma IEC 61131-3 en c\u00f3digo m\u00e1quina nativo para su ejecuci\u00f3n por el tiempo de ejecuci\u00f3n del PLC). El c\u00f3digo m\u00e1quina resultando es ejecutado por un tiempo de ejecuci\u00f3n, normalmente controlado por un sistema operativo en tiempo real. La l\u00f3gica que es descargada en el PLC no parece estar autenticada criptogr\u00e1ficamente, permitiendo a un atacante manipular el c\u00f3digo objeto transmitido al PLC y ejecutar c\u00f3digo m\u00e1quina arbitrario en el procesador del m\u00f3dulo CPU del PLC en el contexto del tiempo de ejecuci\u00f3n. En el caso de al menos la serie NJ, es usada una combinaci\u00f3n de RTOS y hardware que potencialmente permitir\u00eda la protecci\u00f3n de la memoria y la separaci\u00f3n de privilegios y, por tanto, limitar\u00eda el impacto de la ejecuci\u00f3n de c\u00f3digo. Sin embargo, no ha sido confirmado si \u00e9stos segmentan suficientemente el tiempo de ejecuci\u00f3n del resto del RTOS."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 9.8,
|
||
|
"baseSeverity": "CRITICAL"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 5.9
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-347"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nx701-1600_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.29",
|
||
|
"matchCriteriaId": "E4F12068-1901-4BBF-972E-E1675987EE35"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nx701-1600:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A613C260-184B-4131-B2EC-656D8322F86B"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nx701-1620_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.29",
|
||
|
"matchCriteriaId": "0F9094BC-9085-4BC8-89A4-DDD35B87CDD8"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nx701-1620:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "210D7FA7-18A3-45B7-976B-9DEDC59294C7"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nx701-1700_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.29",
|
||
|
"matchCriteriaId": "9A5FC714-3B8F-471E-B57E-9283259695CF"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nx701-1700:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "753A218D-C738-42E5-B523-ED7CACCAEC82"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nx701-1720_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.29",
|
||
|
"matchCriteriaId": "52701918-BD60-475B-8963-8544FB9BC1E4"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nx701-1720:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2434BE7E-3E5D-48A9-838C-BCC6055135F9"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nx701-z600_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.29",
|
||
|
"matchCriteriaId": "450F2854-E366-4D70-8B7E-44140590F59B"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nx701-z600:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "90B7C106-4C14-4C0A-BA78-9A3DD63EF576"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nx701-z700_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.29",
|
||
|
"matchCriteriaId": "FBB2AA45-8B9B-4376-AA9E-1241DA568608"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nx701-z700:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "36F25E10-A76C-4A16-B72B-4B9E572EDBAB"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj101-1000_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "46296F6D-FFE5-4BFD-859D-C5518AA273BD"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj101-1000:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E5A77DA0-B22A-4C26-8E64-6F272CD420A3"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj101-1020_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "6FBB178B-ABF6-48B6-9A73-F99F8C3E88DF"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj101-1020:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8A75CF5D-0ADE-448E-BF3C-8E2C268EE1BD"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj101-9000_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "91C5A297-8C80-4A4D-849B-AB91BADDFB5F"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj101-9000:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E3883A8C-C4EC-45F0-B164-0BADFF91E361"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj101-9020_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "1712FCB6-4759-4124-9AC8-3DC8C5173B45"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj101-9020:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8696CE8A-C041-4EED-888B-36F2E499E67A"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj301-1100_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "867EA94A-2DE2-473A-9EF5-4C4F84A949DF"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj301-1100:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6D92B425-000A-4A85-820E-E16B8AFF06B8"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj301-1200_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "C29A7920-4D29-4143-A8A7-A9B00B4C8038"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj301-1200:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3D279907-5CF4-416F-BE78-300FD52B5B2D"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-1300_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "4A92B074-662B-4FB1-BEDC-7CE51360F63E"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-1300:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2917E7F0-DAA8-4D3B-A5E4-FB0ACAEF02C5"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-1320_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "313049B9-C0CF-4D50-A083-BF83001DF7E4"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-1320:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "69D21068-A51D-48B2-BF17-68BC61737EBC"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-1340_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "2079887D-43D8-4FFF-A54F-FA7357DC47FF"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-1340:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1B381AE4-A769-403A-97FA-14FA5F8122CC"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-1400_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "C88CFCB1-79AC-4A90-8D1C-2E71B5E37797"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-1400:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E25F4D25-6ED0-41DD-B202-98F75FA092CD"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-1420_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "43E0C31B-AD01-4056-8201-C38FF55B114A"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-1420:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "148C6AE8-1480-4822-8E0B-1E8575246878"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-1500_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "BAC9F6F9-6988-494D-BAD4-0D851BD15EBD"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-1500:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DD281699-D123-4301-9EDF-4BE249E24FF8"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-1520_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "C74AC275-2592-4A76-9A50-18620FAFD8D8"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-1520:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CBBE1648-D428-4A43-831D-AB3AF3F05739"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-4300_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "D4F00EEA-9D04-4D7A-BD3E-11530FB492A7"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-4300:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "EB77802D-96CB-49DB-A912-9DB901130F08"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-4320_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "4DE6230B-7F01-4F94-A7EA-675B63BF82E5"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-4320:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "060083B0-E9E5-4694-94AB-3517B4B6E0C2"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-4400_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "3473072F-6535-44A7-AA5C-4DAF8C635E7C"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-4400:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8D53224A-F4AE-42D5-9CE6-C46892BD658D"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-4500_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "E32817C5-322A-40C6-A38D-CED8312EB350"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-4500:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7E8F99DC-4992-4141-AD76-B8A0A690AD4D"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-5300_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "CAB2C973-C5E1-4F4A-9390-BF0544FC0286"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-5300:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1FEF30DD-FCF0-499E-B5C2-4184C9A7E9D8"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:omron:nj501-5300-1_firmware:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "1.49",
|
||
|
"matchCriteriaId": "9FEFCEAD-F811-41DC-9493-648ED9DE48E5"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:omron:nj501-5300-1:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D5EC53CE-17CD-428E-A750-A323BF5F0ABE"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-02",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"US Government Resource"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.forescout.com/blog/",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|