AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Omron
OM
Platform

Omron

Japanese automation specialist known for Sysmac NJ/NX machine automation controllers, G5-Series servo drives, and EtherCAT-based motion control.

https://www.ia.omron.com/ →
52
Total CVEs
10
Resources
9
CRIT
26
HIGH
14
MED
3
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
52 entries
CVE-2023-27396CRITICAL

FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)

Jun 19, 2023
9.8
CVE-2023-22357CRITICAL

Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacker may read/write in arbitrary area of the device memory, which may lead to overwriting the firmware, causing a denial-of-service (DoS) condition, and/or arbitrary code execution.

Jan 17, 2023
9.8
CVE-2022-31207CRITICAL

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.

Jul 26, 2022
9.8
CVE-2022-31206CRITICAL

The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS.

Jul 26, 2022
9.8
CVE-2019-18269CRITICAL

Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.

Dec 16, 2019
9.8
CVE-2019-18261CRITICAL

In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, all versions, the software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.

Dec 16, 2019
9.8
CVE-2019-18259CRITICAL

In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.

Dec 16, 2019
9.8
CVE-2018-6624CRITICAL

OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct request to the .html file for a specific screen, as demonstrated by monitor.html.

Feb 5, 2018
9.8
CVE-2023-0811CRITICAL

Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.

Mar 16, 2023
9.1
CVE-2000-0704HIGH

Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.

Oct 20, 2000
10.0
CVE-2020-27261HIGH

The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.

Feb 9, 2021
8.8
CVE-2020-27259HIGH

The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.

Feb 9, 2021
8.8
CVE-2019-18251HIGH

In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit.

Nov 26, 2019
8.8
CVE-2022-45790HIGH

The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic.

Jan 22, 2024
8.6
CVE-2019-13533HIGH

In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monitor traffic between the PLC and the controller and replay requests that could result in the opening and closing of industrial valves.

Dec 16, 2019
8.1
CVE-2022-3398HIGH

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

Oct 6, 2022
7.8
CVE-2022-3397HIGH

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

Oct 6, 2022
7.8
CVE-2022-3396HIGH

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

Oct 6, 2022
7.8
CVE-2022-26419HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-26417HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-26022HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-25959HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-21137HIGH

Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.

Jan 14, 2022
7.8
CVE-2021-27413HIGH

Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.

May 13, 2021
7.8
CVE-2020-27257HIGH

This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.

Feb 9, 2021
7.8
CVE-2018-17913HIGH

A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application.

Nov 5, 2018
7.8
CVE-2018-17909HIGH

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application.

Nov 5, 2018
7.8
CVE-2018-17905HIGH

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object.

Nov 5, 2018
7.8
CVE-2018-8834HIGH

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.

Apr 17, 2018
7.8
CVE-2018-7530HIGH

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.

Apr 17, 2018
7.8
CVE-2018-7514HIGH

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.

Apr 17, 2018
7.8
CVE-2022-31205HIGH

In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the Web UI is stored in memory area D1449...D1452 and can be read out using the Omron FINS protocol without any further authentication.

Jul 26, 2022
7.5
CVE-2022-31204HIGH

Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feature a UM Protection setting that allows users or system integrators to configure a password in order to restrict sensitive engineering operations (such as project/logic uploads and downloads). This password is set using the OMRON FINS command Program Area Protect and unset using the command Program Area Protect Clear, both of which are transmitted in cleartext.

Jul 26, 2022
7.5
CVE-2022-33971HIGH

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.

Jul 4, 2022
7.5
CVE-2020-6986HIGH

In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets within a short period, causing a service error on the PLC Ethernet module, which in turn causes a PLC service denied result.

Mar 5, 2020
7.5
CVE-2025-9818MEDIUM

A vulnerability (CWE-428) has been identified in the Uninterruptible Power Supply (UPS) management application provided by OMRON SOCIAL SOLUTIONS Co., Ltd., where the executable file paths of Windows services are not enclosed in quotation marks. If the installation folder path of this product contains spaces, there is a possibility that unauthorized files may be executed under the service privileges by using paths containing spaces.

Sep 17, 2025
6.7
CVE-2024-49501MEDIUM

Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If this vulnerability is exploited, an attacker may access the program which is protected by Data Protection function.

Nov 1, 2024
5.7
CVE-2023-22322MEDIUM

Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion Pro 1.4.6.013 and earlier. If a user opens a specially crafted project file created by an attacker, sensitive information in the file system where CX-Motion Pro is installed may be disclosed.

Jan 30, 2023
5.5
CVE-2018-7525MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability.

Mar 21, 2018
5.3
CVE-2018-7523MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability.

Mar 21, 2018
5.3
CVE-2018-7521MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file.

Mar 21, 2018
5.3
CVE-2018-7519MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow.

Mar 21, 2018
5.3
CVE-2018-7517MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability.

Mar 21, 2018
5.3
CVE-2018-7515MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets.

Mar 21, 2018
5.3
CVE-2018-7513MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow.

Mar 21, 2018
5.3
CVE-2015-0987MEDIUM

Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 rely on cleartext password transmission, which allows remote attackers to obtain sensitive information by sniffing the network during a PLC unlock request.

Oct 6, 2015
5.0
CVE-2014-2369MEDIUM

Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

Jul 24, 2014
4.6
CVE-2013-2301MEDIUM

The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, which allows attackers to obtain sensitive information via an application that accesses the local filesystem.

Mar 29, 2013
4.3
CVE-2014-2370MEDIUM

Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to inject arbitrary web script or HTML via crafted data.

Jul 24, 2014
4.0
CVE-2018-17907LOW

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.

Nov 5, 2018
3.3
CVE-2015-1015LOW

Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 use a reversible format for password storage in object files on Compact Flash cards, which makes it easier for local users to obtain sensitive information by reading a file.

Oct 6, 2015
2.1
CVE-2015-0988LOW

Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project source-code files, which makes it easier for local users to obtain sensitive information by reading a file.

Oct 6, 2015
2.1
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2023-27396CRITICAL
9.8
FINS (Factory Interface Network Service) is a message communication protocol, which is designed to b…Jun 19, 2023›
CVE-2023-22357CRITICAL
9.8
Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is no…Jan 17, 2023›
CVE-2022-31207CRITICAL
9.8
The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lac…Jul 26, 2022›
CVE-2022-31206CRITICAL
9.8
The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2…Jul 26, 2022›
CVE-2019-18269CRITICAL
9.8
Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.Dec 16, 2019›
CVE-2019-18261CRITICAL
9.8
In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, al…Dec 16, 2019›
CVE-2019-18259CRITICAL
9.8
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof …Dec 16, 2019›
CVE-2018-6624CRITICAL
9.8
OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct reques…Feb 5, 2018›
CVE-2023-0811CRITICAL
9.1
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM passw…Mar 16, 2023›
CVE-2000-0704HIGH
10.0
Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via…Oct 20, 2000›
CVE-2020-27261HIGH
8.8
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may al…Feb 9, 2021›
CVE-2020-27259HIGH
8.8
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memor…Feb 9, 2021›
CVE-2019-18251HIGH
8.8
In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Versi…Nov 26, 2019›
CVE-2022-45790HIGH
8.6
The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentica…Jan 22, 2024›
CVE-2019-13533HIGH
8.1
In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monit…Dec 16, 2019›
CVE-2022-3398HIGH
7.8
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac…Oct 6, 2022›
CVE-2022-3397HIGH
7.8
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac…Oct 6, 2022›
CVE-2022-3396HIGH
7.8
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac…Oct 6, 2022›
CVE-2022-26419HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow c…Apr 1, 2022›
CVE-2022-26417HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition whil…Apr 1, 2022›
CVE-2022-26022HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processin…Apr 1, 2022›
CVE-2022-25959HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a s…Apr 1, 2022›
CVE-2022-21137HIGH
7.8
Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processin…Jan 14, 2022›
CVE-2021-27413HIGH
7.8
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerabl…May 13, 2021›
CVE-2020-27257HIGH
7.8
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper valida…Feb 9, 2021›
CVE-2018-17913HIGH
7.8
A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions …Nov 5, 2018›
CVE-2018-17909HIGH
7.8
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fai…Nov 5, 2018›
CVE-2018-17905HIGH
7.8
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a…Nov 5, 2018›
CVE-2018-8834HIGH
7.8
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app…Apr 17, 2018›
CVE-2018-7530HIGH
7.8
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app…Apr 17, 2018›
CVE-2018-7514HIGH
7.8
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app…Apr 17, 2018›
CVE-2022-31205HIGH
7.5
In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the…Jul 26, 2022›
CVE-2022-31204HIGH
7.5
Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feat…Jul 26, 2022›
CVE-2022-33971HIGH
7.5
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 se…Jul 4, 2022›
CVE-2020-6986HIGH
7.5
In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets withi…Mar 5, 2020›
CVE-2025-9818MEDIUM
6.7
A vulnerability (CWE-428) has been identified in the Uninterruptible Power Supply (UPS) management a…Sep 17, 2025›
CVE-2024-49501MEDIUM
5.7
Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If th…Nov 1, 2024›
CVE-2023-22322MEDIUM
5.5
Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion …Jan 30, 2023›
CVE-2018-7525MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executabl…Mar 21, 2018›
CVE-2018-7523MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double f…Mar 21, 2018›
CVE-2018-7521MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when…Mar 21, 2018›
CVE-2018-7519MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-bas…Mar 21, 2018›
CVE-2018-7517MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of …Mar 21, 2018›
CVE-2018-7515MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can …Mar 21, 2018›
CVE-2018-7513MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-ba…Mar 21, 2018›
CVE-2015-0987MEDIUM
5.0
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 …Oct 6, 2015›
CVE-2014-2369MEDIUM
4.6
Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12…Jul 24, 2014›
CVE-2013-2301MEDIUM
4.3
The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, …Mar 29, 2013›
CVE-2014-2370MEDIUM
4.0
Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and N…Jul 24, 2014›
CVE-2018-17907LOW
3.3
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with t…Nov 5, 2018›
CVE-2015-1015LOW
2.1
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 …Oct 6, 2015›
CVE-2015-0988LOW
2.1
Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project sourc…Oct 6, 2015›