Vulnerability Description
Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacker may read/write in arbitrary area of the device memory, which may lead to overwriting the firmware, causing a denial-of-service (DoS) condition, and/or arbitrary code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Omron | Cp1L-El20Dr-D Firmware | All versions |
| Omron | Cp1L-El20Dr-D | - |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/vu/JVNVU97575890/index.htmlThird Party Advisory
- https://jvn.jp/en/vu/JVNVU97575890/index.htmlThird Party Advisory
FAQ
What is CVE-2023-22357?
CVE-2023-22357 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacke...
How severe is CVE-2023-22357?
CVE-2023-22357 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-22357?
Check the references section above for vendor advisories and patch information. Affected products include: Omron Cp1L-El20Dr-D Firmware, Omron Cp1L-El20Dr-D.