FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)
Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacker may read/write in arbitrary area of the device memory, which may lead to overwriting the firmware, causing a denial-of-service (DoS) condition, and/or arbitrary code execution.
The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.
The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS.
Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.
In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, all versions, the software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.
OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct request to the .html file for a specific screen, as demonstrated by monitor.html.
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.
Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.
In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit.
The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic.
In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monitor traffic between the PLC and the controller and replay requests that could result in the opening and closing of industrial valves.
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code.
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code.
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code.
Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application.
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application.
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object.
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.
In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the Web UI is stored in memory area D1449...D1452 and can be read out using the Omron FINS protocol without any further authentication.
Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feature a UM Protection setting that allows users or system integrators to configure a password in order to restrict sensitive engineering operations (such as project/logic uploads and downloads). This password is set using the OMRON FINS command Program Area Protect and unset using the command Program Area Protect Clear, both of which are transmitted in cleartext.
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.
In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets within a short period, causing a service error on the PLC Ethernet module, which in turn causes a PLC service denied result.
A vulnerability (CWE-428) has been identified in the Uninterruptible Power Supply (UPS) management application provided by OMRON SOCIAL SOLUTIONS Co., Ltd., where the executable file paths of Windows services are not enclosed in quotation marks. If the installation folder path of this product contains spaces, there is a possibility that unauthorized files may be executed under the service privileges by using paths containing spaces.
Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If this vulnerability is exploited, an attacker may access the program which is protected by Data Protection function.
Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion Pro 1.4.6.013 and earlier. If a user opens a specially crafted project file created by an attacker, sensitive information in the file system where CX-Motion Pro is installed may be disclosed.
In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability.
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability.
In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file.
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow.
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability.
In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets.
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow.
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 rely on cleartext password transmission, which allows remote attackers to obtain sensitive information by sniffing the network during a PLC unlock request.
Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.
The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, which allows attackers to obtain sensitive information via an application that accesses the local filesystem.
Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to inject arbitrary web script or HTML via crafted data.
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 use a reversible format for password storage in object files on Compact Flash cards, which makes it easier for local users to obtain sensitive information by reading a file.
Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project source-code files, which makes it easier for local users to obtain sensitive information by reading a file.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2023-27396 | CRITICAL | FINS (Factory Interface Network Service) is a message communication protocol, which is designed to b… | › |
| CVE-2023-22357 | CRITICAL | Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is no… | › |
| CVE-2022-31207 | CRITICAL | The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lac… | › |
| CVE-2022-31206 | CRITICAL | The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2… | › |
| CVE-2019-18269 | CRITICAL | Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability. | › |
| CVE-2019-18261 | CRITICAL | In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, al… | › |
| CVE-2019-18259 | CRITICAL | In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof … | › |
| CVE-2018-6624 | CRITICAL | OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct reques… | › |
| CVE-2023-0811 | CRITICAL | Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM passw… | › |
| CVE-2000-0704 | HIGH | Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via… | › |
| CVE-2020-27261 | HIGH | The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may al… | › |
| CVE-2020-27259 | HIGH | The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memor… | › |
| CVE-2019-18251 | HIGH | In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Versi… | › |
| CVE-2022-45790 | HIGH | The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentica… | › |
| CVE-2019-13533 | HIGH | In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monit… | › |
| CVE-2022-3398 | HIGH | OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac… | › |
| CVE-2022-3397 | HIGH | OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac… | › |
| CVE-2022-3396 | HIGH | OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac… | › |
| CVE-2022-26419 | HIGH | Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow c… | › |
| CVE-2022-26417 | HIGH | Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition whil… | › |
| CVE-2022-26022 | HIGH | Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processin… | › |
| CVE-2022-25959 | HIGH | Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a s… | › |
| CVE-2022-21137 | HIGH | Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processin… | › |
| CVE-2021-27413 | HIGH | Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerabl… | › |
| CVE-2020-27257 | HIGH | This vulnerability allows local attackers to execute arbitrary code due to the lack of proper valida… | › |
| CVE-2018-17913 | HIGH | A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions … | › |
| CVE-2018-17909 | HIGH | When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fai… | › |
| CVE-2018-17905 | HIGH | When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a… | › |
| CVE-2018-8834 | HIGH | Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app… | › |
| CVE-2018-7530 | HIGH | Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app… | › |
| CVE-2018-7514 | HIGH | Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app… | › |
| CVE-2022-31205 | HIGH | In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the… | › |
| CVE-2022-31204 | HIGH | Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feat… | › |
| CVE-2022-33971 | HIGH | Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 se… | › |
| CVE-2020-6986 | HIGH | In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets withi… | › |
| CVE-2025-9818 | MEDIUM | A vulnerability (CWE-428) has been identified in the Uninterruptible Power Supply (UPS) management a… | › |
| CVE-2024-49501 | MEDIUM | Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If th… | › |
| CVE-2023-22322 | MEDIUM | Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion … | › |
| CVE-2018-7525 | MEDIUM | In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executabl… | › |
| CVE-2018-7523 | MEDIUM | In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double f… | › |
| CVE-2018-7521 | MEDIUM | In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when… | › |
| CVE-2018-7519 | MEDIUM | In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-bas… | › |
| CVE-2018-7517 | MEDIUM | In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of … | › |
| CVE-2018-7515 | MEDIUM | In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can … | › |
| CVE-2018-7513 | MEDIUM | In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-ba… | › |
| CVE-2015-0987 | MEDIUM | Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 … | › |
| CVE-2014-2369 | MEDIUM | Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12… | › |
| CVE-2013-2301 | MEDIUM | The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, … | › |
| CVE-2014-2370 | MEDIUM | Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and N… | › |
| CVE-2018-17907 | LOW | When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with t… | › |
| CVE-2015-1015 | LOW | Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 … | › |
| CVE-2015-0988 | LOW | Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project sourc… | › |