CRITICAL · 9.8

CVE-2022-31207

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purp...

Vulnerability Description

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
OmronSysmac Cs1 Firmware< 4.1
OmronSysmac Cs1-
OmronSysmac Cj2M Firmware< 2.1
OmronSysmac Cj2M-
OmronSysmac Cj2H Firmware< 1.5
OmronSysmac Cj2H-
OmronSysmac Cp1E Firmware< 1.30
OmronSysmac Cp1E-
OmronSysmac Cp1H Firmware< 1.30
OmronSysmac Cp1H-
OmronSysmac Cp1L Firmware< 1.10
OmronSysmac Cp1L-
OmronCp1W-Cif41 Firmware-
OmronCp1W-Cif41-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-31207?

CVE-2022-31207 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purp...

How severe is CVE-2022-31207?

CVE-2022-31207 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2022-31207?

Check the references section above for vendor advisories and patch information. Affected products include: Omron Sysmac Cs1 Firmware, Omron Sysmac Cs1, Omron Sysmac Cj2M Firmware, Omron Sysmac Cj2M, Omron Sysmac Cj2H Firmware.