Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-8061 | Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability. |
Solution
No solution given by the vendor.
Workaround
Omron recommends the following mitigation measures: * Filter FINS port: Protect access to Omron’s PLC with a firewall and blocking unnecessary remote access to FINS port (default: 9600). * Filter IP addresses: Protect access to Omron’s PLC with a firewall and filtering devices connected to the PLC by IP address. For more information provided by Omron on these vulnerabilities refer to Vulnerabilities in Omron CS and CJ series CPU PLCs https://gcc01.safelinks.protection.outlook.com/ .
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-05T01:47:14.075Z
Reserved: 2019-10-22T00:00:00
Link: CVE-2019-18269

No data.

Status : Modified
Published: 2019-12-16T20:15:15.773
Modified: 2024-11-21T04:32:56.703
Link: CVE-2019-18269

No data.

No data.