Project Subscriptions
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-8061 | Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability. |
Solution
No solution given by the vendor.
Workaround
Omron recommends the following mitigation measures: * Filter FINS port: Protect access to Omron’s PLC with a firewall and blocking unnecessary remote access to FINS port (default: 9600). * Filter IP addresses: Protect access to Omron’s PLC with a firewall and filtering devices connected to the PLC by IP address. For more information provided by Omron on these vulnerabilities refer to Vulnerabilities in Omron CS and CJ series CPU PLCs https://gcc01.safelinks.protection.outlook.com/ .
Fri, 20 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability. | Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability. |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-05T01:47:14.075Z
Reserved: 2019-10-22T00:00:00.000Z
Link: CVE-2019-18269
No data.
Status : Modified
Published: 2019-12-16T20:15:15.773
Modified: 2026-02-20T20:24:37.213
Link: CVE-2019-18269
No data.
OpenCVE Enrichment
No data.
EUVD