JTEKT TOYOPUC PLCs through 2022-04-29 mishandle authentication. They utilize the CMPLink/TCP protocol (configurable on ports 1024-65534 on either TCP or UDP) for a wide variety of engineering purposes such as starting and stopping the PLC, downloading and uploading projects, and changing configuration settings. This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Jtekt
Subscribe
|
Nano 10gx Tuc-1157
Subscribe
Nano 10gx Tuc-1157 Firmware
Subscribe
Nano Cpu Tuc-6941
Subscribe
Nano Cpu Tuc-6941 Firmware
Subscribe
Pc10b-p Tcc-6373
Subscribe
Pc10b-p Tcc-6373 Firmware
Subscribe
Pc10b Tcc-1021
Subscribe
Pc10b Tcc-1021 Firmware
Subscribe
Pc10e Tcc-4737
Subscribe
Pc10e Tcc-4737 Firmware
Subscribe
Pc10el Tcc-4747
Subscribe
Pc10el Tcc-4747 Firmware
Subscribe
Pc10g-cpu Tcc-6353
Subscribe
Pc10g-cpu Tcc-6353 Firmware
Subscribe
Pc10ge Tcc-6464
Subscribe
Pc10ge Tcc-6464 Firmware
Subscribe
Pc10p-dp-io Tcc-6752
Subscribe
Pc10p-dp-io Tcc-6752 Firmware
Subscribe
Pc10p-dp Tcc-6726
Subscribe
Pc10p-dp Tcc-6726 Firmware
Subscribe
Pc10p Tcc-6372
Subscribe
Pc10p Tcc-6372 Firmware
Subscribe
Pc10pe-1616p Tcc-1102
Subscribe
Pc10pe-1616p Tcc-1102 Firmware
Subscribe
Pc10pe Tcc-1101
Subscribe
Pc10pe Tcc-1101 Firmware
Subscribe
Pc3jx-d Tcc-6902
Subscribe
Pc3jx-d Tcc-6902 Firmware
Subscribe
Pc3jx Tcc-6901
Subscribe
Pc3jx Tcc-6901 Firmware
Subscribe
Pcdl Tkc-6688
Subscribe
Pcdl Tkc-6688 Firmware
Subscribe
Plus Cpu Tcc-6740
Subscribe
Plus Cpu Tcc-6740 Firmware
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 27 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-27T14:56:59.084Z
Reserved: 2022-04-29T00:00:00
Link: CVE-2022-29951
Updated: 2024-08-03T06:33:43.193Z
Status : Modified
Published: 2022-07-26T22:15:10.800
Modified: 2024-11-21T07:00:02.900
Link: CVE-2022-29951
No data.
OpenCVE Enrichment
No data.
Weaknesses