[Japanese]
|
JVNDB-2022-002765
|
Multiple vulnerabilities in OMRON CX-Programmer
|
CX-Programmer provided by Omron Corporation contains multiple vulnerabilities listed below.
* Use-after-free (CWE-416) - CVE-2022-43508, CVE-2023-22277, CVE-2023-22317, CVE-2023-22314
* Out-of-bounds Write (CWE-787) - CVE-2022-43509
* Stack-based Buffer Overflow (CWE-121) - CVE-2022-43667
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
|
CVSS V3 Severity: Base Metrics 7.8 (High) [Other]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
The above CVSS base scores have been assigned for CVE-2022-43508,CVE-2023-22277,CVE-2023-22317,CVE-2023-22314
|
CVSS V3 Severity:
Base Metrics:7.8 (High) [Other]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
The above CVSS base scores have been assigned for CVE-2022-43509
|
CVSS V3 Severity:
Base Metrics:7.8 (High) [Other]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
The above CVSS base scores have been assigned for CVE-2022-43667
|
|
OMRON Corporation
- CX-Programmer Ver.9.77 and earlier - CVE-2022-43508
- CX-Programmer Ver.9.78 and earlier - CVE-2022-43509, CVE-2022-43667
- CX-Programmer Ver.9.79 and earlier - CVE-2023-22277, CVE-2023-22317, CVE-2023-22314
|
|
By having a user to open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur.
|
[Update the Software]
Update for CX-One suite is applied by its Auto Update function, therefore it is not necessary for the users to take any actions.
The developer recommends the users to contact the developer and/or the sales representatives if there are any issues with Auto Update.
For more information, refer to the information provided by the developer.
|
OMRON Corporation
|
- Stack-based Buffer Overflow(CWE-121) [Other]
- Use After Free(CWE-416) [Other]
- Out-of-bounds Write(CWE-787) [Other]
|
- CVE-2022-43508
- CVE-2022-43509
- CVE-2022-43667
- CVE-2023-22277
- CVE-2023-22314
- CVE-2023-22317
|
- JVN : JVNVU#92877622
- National Vulnerability Database (NVD) : CVE-2022-43508
- National Vulnerability Database (NVD) : CVE-2022-43509
- National Vulnerability Database (NVD) : CVE-2022-43667
- National Vulnerability Database (NVD) : CVE-2023-22277
- National Vulnerability Database (NVD) : CVE-2023-22314
- National Vulnerability Database (NVD) : CVE-2023-22317
- IPA SECURITY ALERTS : ICSA-22-356-04
|
- [2022/11/28]
Web page was published
- [2023/01/12]
Overview was modified
CVSS Severity was modified
Affected Products : Product versions were added
Solution was modified
CVE : CVE-2023-22277,CVE-2023-22314,CVE-2023-22317 was added
References : Contents were added
- [2024/04/05]
References : Contents were added
|