JTEKT TOYOPUC PLCs through 2022-04-29 mishandle authentication. They utilize the CMPLink/TCP protocol (configurable on ports 1024-65534 on either TCP or UDP) for a wide variety of engineering purposes such as starting and stopping the PLC, downloading and uploading projects, and changing configuration settings. This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.

Project Subscriptions

Vendors Products
Nano 10gx Tuc-1157 Subscribe
Nano 10gx Tuc-1157 Firmware Subscribe
Nano Cpu Tuc-6941 Subscribe
Nano Cpu Tuc-6941 Firmware Subscribe
Pc10b-p Tcc-6373 Subscribe
Pc10b-p Tcc-6373 Firmware Subscribe
Pc10b Tcc-1021 Subscribe
Pc10b Tcc-1021 Firmware Subscribe
Pc10e Tcc-4737 Subscribe
Pc10e Tcc-4737 Firmware Subscribe
Pc10el Tcc-4747 Subscribe
Pc10el Tcc-4747 Firmware Subscribe
Pc10g-cpu Tcc-6353 Subscribe
Pc10g-cpu Tcc-6353 Firmware Subscribe
Pc10ge Tcc-6464 Subscribe
Pc10ge Tcc-6464 Firmware Subscribe
Pc10p-dp-io Tcc-6752 Subscribe
Pc10p-dp-io Tcc-6752 Firmware Subscribe
Pc10p-dp Tcc-6726 Subscribe
Pc10p-dp Tcc-6726 Firmware Subscribe
Pc10p Tcc-6372 Subscribe
Pc10p Tcc-6372 Firmware Subscribe
Pc10pe-1616p Tcc-1102 Subscribe
Pc10pe-1616p Tcc-1102 Firmware Subscribe
Pc10pe Tcc-1101 Subscribe
Pc10pe Tcc-1101 Firmware Subscribe
Pc3jx-d Tcc-6902 Subscribe
Pc3jx-d Tcc-6902 Firmware Subscribe
Pc3jx Tcc-6901 Subscribe
Pc3jx Tcc-6901 Firmware Subscribe
Pcdl Tkc-6688 Subscribe
Pcdl Tkc-6688 Firmware Subscribe
Plus Cpu Tcc-6740 Subscribe
Plus Cpu Tcc-6740 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 27 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-27T14:56:59.084Z

Reserved: 2022-04-29T00:00:00

Link: CVE-2022-29951

cve-icon Vulnrichment

Updated: 2024-08-03T06:33:43.193Z

cve-icon NVD

Status : Modified

Published: 2022-07-26T22:15:10.800

Modified: 2024-11-21T07:00:02.900

Link: CVE-2022-29951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses