omron CVE Vulnerabilities & Metrics

Focus on omron vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About omron Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with omron. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total omron CVEs: 85
Earliest CVE date: 20 Oct 2000, 04:00 UTC
Latest CVE date: 24 Jun 2024, 15:15 UTC

Latest CVE reference: CVE-2024-33687

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -92.86%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -92.86%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical omron CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.95

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 34
4.0-6.9 50
7.0-8.9 4
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS omron CVEs

These are the five CVEs with the highest CVSS scores for omron, sorted by severity first and recency.

All CVEs for omron

CVE-2024-33687 omron vulnerability CVSS: 0 24 Jun 2024, 15:15 UTC

Insufficient verification of data authenticity issue exists in NJ Series CPU Unit all versions and NX Series CPU Unit all versions. If a user program in the affected product is altered, the product may not be able to detect the alteration.

CVE-2022-45792 omron vulnerability CVSS: 0 22 Jan 2024, 18:15 UTC

Project files may contain malicious contents which the software will use to create files on the filesystem. This allows directory traversal and overwriting files with the privileges of the logged-in user.

CVE-2022-45790 omron vulnerability CVSS: 0 22 Jan 2024, 18:15 UTC

The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic.

CVE-2022-45794 omron vulnerability CVSS: 0 10 Jan 2024, 23:15 UTC

An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.

CVE-2022-45793 omron vulnerability CVSS: 0 10 Jan 2024, 21:15 UTC

Sysmac Studio installs executables in a directory with poor permissions. This can allow a locally-authenticated attacker to overwrite files which will result in code execution with privileges of a different user.

CVE-2023-22277 omron vulnerability CVSS: 0 03 Aug 2023, 15:15 UTC

Use after free vulnerability exists in CX-Programmer Ver.9.79 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. This vulnerability is different from CVE-2023-22317 and CVE-2023-22314.

CVE-2023-22317 omron vulnerability CVSS: 0 03 Aug 2023, 13:15 UTC

Use after free vulnerability exists in CX-Programmer Ver.9.79 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. This vulnerability is different from CVE-2023-22277 and CVE-2023-22314.

CVE-2023-22314 omron vulnerability CVSS: 0 03 Aug 2023, 13:15 UTC

Use after free vulnerability exists in CX-Programmer Ver.9.79 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. This vulnerability is different from CVE-2023-22277 and CVE-2023-22317.

CVE-2023-38748 omron vulnerability CVSS: 0 03 Aug 2023, 06:15 UTC

Use after free vulnerability exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur.

CVE-2023-38747 omron vulnerability CVSS: 0 03 Aug 2023, 06:15 UTC

Heap-based buffer overflow vulnerability exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur.

CVE-2023-38746 omron vulnerability CVSS: 0 03 Aug 2023, 05:15 UTC

Out-of-bounds read vulnerability/issue exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur.

CVE-2023-38744 omron vulnerability CVSS: 0 03 Aug 2023, 05:15 UTC

Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.

CVE-2023-27396 omron vulnerability CVSS: 0 19 Jun 2023, 05:15 UTC

FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)

CVE-2023-27385 omron vulnerability CVSS: 0 10 May 2023, 06:15 UTC

Heap-based buffer overflow vulnerability exists in CX-Drive All models all versions. By having a user open a specially crafted SDD file, arbitrary code may be executed and/or information may be disclosed.

CVE-2023-0811 omron vulnerability CVSS: 0 16 Mar 2023, 18:15 UTC

Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.

CVE-2023-22322 omron vulnerability CVSS: 0 30 Jan 2023, 07:15 UTC

Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion Pro 1.4.6.013 and earlier. If a user opens a specially crafted project file created by an attacker, sensitive information in the file system where CX-Motion Pro is installed may be disclosed.

CVE-2023-22366 omron vulnerability CVSS: 0 17 Jan 2023, 10:15 UTC

CX-Motion-MCH v2.32 and earlier contains an access of uninitialized pointer vulnerability. Having a user to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.

CVE-2023-22357 omron vulnerability CVSS: 0 17 Jan 2023, 10:15 UTC

Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacker may read/write in arbitrary area of the device memory, which may lead to overwriting the firmware, causing a denial-of-service (DoS) condition, and/or arbitrary code execution.

CVE-2022-46282 omron vulnerability CVSS: 0 21 Dec 2022, 09:15 UTC

Use after free vulnerability in CX-Drive V3.00 and earlier allows a local attacker to execute arbitrary code by having a user to open a specially crafted file,

CVE-2022-43667 omron vulnerability CVSS: 0 07 Dec 2022, 04:15 UTC

Stack-based buffer overflow vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file.

CVE-2022-43509 omron vulnerability CVSS: 0 07 Dec 2022, 04:15 UTC

Out-of-bounds write vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file.

CVE-2022-43508 omron vulnerability CVSS: 0 07 Dec 2022, 04:15 UTC

Use-after free vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file.

CVE-2022-3398 omron vulnerability CVSS: 0 06 Oct 2022, 18:16 UTC

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

CVE-2022-3397 omron vulnerability CVSS: 0 06 Oct 2022, 18:16 UTC

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

CVE-2022-3396 omron vulnerability CVSS: 0 06 Oct 2022, 18:16 UTC

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

CVE-2022-2979 omron vulnerability CVSS: 0 12 Sep 2022, 21:15 UTC

Opening a specially crafted file could cause the affected product to fail to release its memory reference potentially resulting in arbitrary code execution.

CVE-2022-31207 omron vulnerability CVSS: 0 26 Jul 2022, 22:15 UTC

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.

CVE-2022-31206 omron vulnerability CVSS: 0 26 Jul 2022, 22:15 UTC

The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS.

CVE-2022-31205 omron vulnerability CVSS: 0 26 Jul 2022, 22:15 UTC

In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the Web UI is stored in memory area D1449...D1452 and can be read out using the Omron FINS protocol without any further authentication.

CVE-2022-31204 omron vulnerability CVSS: 0 26 Jul 2022, 22:15 UTC

Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feature a UM Protection setting that allows users or system integrators to configure a password in order to restrict sensitive engineering operations (such as project/logic uploads and downloads). This password is set using the OMRON FINS command Program Area Protect and unset using the command Program Area Protect Clear, both of which are transmitted in cleartext.

CVE-2022-34151 omron vulnerability CVSS: 6.8 04 Jul 2022, 02:15 UTC

Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller.

CVE-2022-33971 omron vulnerability CVSS: 5.4 04 Jul 2022, 02:15 UTC

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.

CVE-2022-33208 omron vulnerability CVSS: 6.8 04 Jul 2022, 02:15 UTC

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller.

CVE-2022-26419 omron vulnerability CVSS: 6.8 01 Apr 2022, 23:15 UTC

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.

CVE-2022-26417 omron vulnerability CVSS: 6.8 01 Apr 2022, 23:15 UTC

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code.

CVE-2022-26022 omron vulnerability CVSS: 6.8 01 Apr 2022, 23:15 UTC

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code.

CVE-2022-25959 omron vulnerability CVSS: 6.8 01 Apr 2022, 23:15 UTC

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code.

CVE-2022-25325 omron vulnerability CVSS: 6.8 10 Mar 2022, 17:47 UTC

Use after free vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE-2022-25230.

CVE-2022-25234 omron vulnerability CVSS: 6.8 10 Mar 2022, 17:47 UTC

Out-of-bounds write vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE-2022-21124.

CVE-2022-25230 omron vulnerability CVSS: 6.8 10 Mar 2022, 17:47 UTC

Use after free vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE-2022-25325.

CVE-2022-21219 omron vulnerability CVSS: 6.8 10 Mar 2022, 17:45 UTC

Out-of-bounds read vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file.

CVE-2022-21124 omron vulnerability CVSS: 6.8 10 Mar 2022, 17:45 UTC

Out-of-bounds write vulnerability in CX-Programmer v9.76.1 and earlier which is a part of CX-One (v4.60) suite allows an attacker to cause information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. This vulnerability is different from CVE-2022-25234.

CVE-2022-21137 omron vulnerability CVSS: 6.8 14 Jan 2022, 20:15 UTC

Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.

CVE-2021-20836 omron vulnerability CVSS: 6.0 19 Oct 2021, 03:15 UTC

Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files.

CVE-2021-27413 omron vulnerability CVSS: 6.8 13 May 2021, 19:15 UTC

Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.

CVE-2020-27261 omron vulnerability CVSS: 6.8 09 Feb 2021, 15:15 UTC

The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.

CVE-2020-27259 omron vulnerability CVSS: 6.8 09 Feb 2021, 15:15 UTC

The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.

CVE-2020-27257 omron vulnerability CVSS: 6.8 09 Feb 2021, 15:15 UTC

This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.

CVE-2020-6986 omron vulnerability CVSS: 7.8 05 Mar 2020, 21:15 UTC

In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets within a short period, causing a service error on the PLC Ethernet module, which in turn causes a PLC service denied result.

CVE-2019-18269 omron vulnerability CVSS: 7.5 16 Dec 2019, 20:15 UTC

Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.

CVE-2019-18261 omron vulnerability CVSS: 5.0 16 Dec 2019, 20:15 UTC

In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, all versions, the software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.

CVE-2019-18259 omron vulnerability CVSS: 7.5 16 Dec 2019, 20:15 UTC

In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.

CVE-2019-13533 omron vulnerability CVSS: 6.8 16 Dec 2019, 20:15 UTC

In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monitor traffic between the PLC and the controller and replay requests that could result in the opening and closing of industrial valves.

CVE-2019-18251 omron vulnerability CVSS: 6.8 26 Nov 2019, 00:15 UTC

In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit.

CVE-2019-10971 omron vulnerability CVSS: 6.8 12 Jun 2019, 16:29 UTC

The application (Network Configurator for DeviceNet Safety 3.41 and prior) searches for resources by means of an untrusted search path that could execute a malicious .dll file not under the application's direct control and outside the intended directories.

CVE-2019-6556 omron vulnerability CVSS: 6.8 10 Apr 2019, 20:29 UTC

When processing project files, the application (Omron CX-Programmer v9.70 and prior and Common Components January 2019 and prior) fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.

CVE-2018-16207 omron vulnerability CVSS: 4.0 27 Mar 2019, 14:29 UTC

PowerAct Pro Master Agent for Windows Version 5.13 and earlier allows authenticated attackers to bypass access restriction to alter or edit unauthorized files via unspecified vectors.

CVE-2018-19020 omron vulnerability CVSS: 3.5 12 Feb 2019, 22:29 UTC

When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array.

CVE-2018-19018 omron vulnerability CVSS: 6.0 12 Feb 2019, 22:29 UTC

An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.

CVE-2018-19027 omron vulnerability CVSS: 6.8 30 Jan 2019, 16:29 UTC

Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.

CVE-2018-19015 omron vulnerability CVSS: 6.0 28 Jan 2019, 19:29 UTC

An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application.

CVE-2018-19019 omron vulnerability CVSS: 6.8 22 Jan 2019, 20:29 UTC

A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.

CVE-2018-19017 omron vulnerability CVSS: 6.8 22 Jan 2019, 20:29 UTC

Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.

CVE-2018-19013 omron vulnerability CVSS: 4.9 22 Jan 2019, 20:29 UTC

An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file.

CVE-2018-19011 omron vulnerability CVSS: 6.8 22 Jan 2019, 20:29 UTC

CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.

CVE-2018-18993 omron vulnerability CVSS: 6.8 04 Dec 2018, 22:29 UTC

Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application.

CVE-2018-18989 omron vulnerability CVSS: 6.8 04 Dec 2018, 22:29 UTC

In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.

CVE-2018-17913 omron vulnerability CVSS: 6.8 05 Nov 2018, 23:29 UTC

A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application.

CVE-2018-17909 omron vulnerability CVSS: 6.8 05 Nov 2018, 23:29 UTC

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application.

CVE-2018-17907 omron vulnerability CVSS: 4.3 05 Nov 2018, 23:29 UTC

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.

CVE-2018-17905 omron vulnerability CVSS: 6.8 05 Nov 2018, 23:29 UTC

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object.

CVE-2018-8834 omron vulnerability CVSS: 4.6 17 Apr 2018, 19:29 UTC

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.

CVE-2018-7530 omron vulnerability CVSS: 4.6 17 Apr 2018, 19:29 UTC

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.

CVE-2018-7514 omron vulnerability CVSS: 4.6 17 Apr 2018, 19:29 UTC

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.

CVE-2018-7525 omron vulnerability CVSS: 4.6 21 Mar 2018, 20:29 UTC

In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability.

CVE-2018-7523 omron vulnerability CVSS: 4.6 21 Mar 2018, 20:29 UTC

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability.

CVE-2018-7521 omron vulnerability CVSS: 4.6 21 Mar 2018, 20:29 UTC

In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file.

CVE-2018-7519 omron vulnerability CVSS: 4.6 21 Mar 2018, 20:29 UTC

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow.

CVE-2018-7517 omron vulnerability CVSS: 4.6 21 Mar 2018, 20:29 UTC

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability.

CVE-2018-7515 omron vulnerability CVSS: 4.6 21 Mar 2018, 20:29 UTC

In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets.

CVE-2018-7513 omron vulnerability CVSS: 4.6 21 Mar 2018, 20:29 UTC

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow.

CVE-2018-6624 omron vulnerability CVSS: 7.5 05 Feb 2018, 18:29 UTC

OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct request to the .html file for a specific screen, as demonstrated by monitor.html.

CVE-2015-1015 omron vulnerability CVSS: 2.1 06 Oct 2015, 01:59 UTC

Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 use a reversible format for password storage in object files on Compact Flash cards, which makes it easier for local users to obtain sensitive information by reading a file.

CVE-2015-0988 omron vulnerability CVSS: 2.1 06 Oct 2015, 01:59 UTC

Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project source-code files, which makes it easier for local users to obtain sensitive information by reading a file.

CVE-2015-0987 omron vulnerability CVSS: 5.0 06 Oct 2015, 01:59 UTC

Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 rely on cleartext password transmission, which allows remote attackers to obtain sensitive information by sniffing the network during a PLC unlock request.

CVE-2014-2370 omron vulnerability CVSS: 3.5 24 Jul 2014, 14:55 UTC

Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to inject arbitrary web script or HTML via crafted data.

CVE-2014-2369 omron vulnerability CVSS: 6.0 24 Jul 2014, 14:55 UTC

Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

CVE-2013-2301 omron vulnerability CVSS: 4.3 29 Mar 2013, 16:09 UTC

The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, which allows attackers to obtain sensitive information via an application that accesses the local filesystem.

CVE-2000-0704 omron vulnerability CVSS: 10.0 20 Oct 2000, 04:00 UTC

Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.