The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Omron
Subscribe
|
Nj101-1000
Subscribe
Nj101-1000 Firmware
Subscribe
Nj101-1020
Subscribe
Nj101-1020 Firmware
Subscribe
Nj101-9000
Subscribe
Nj101-9000 Firmware
Subscribe
Nj101-9020
Subscribe
Nj101-9020 Firmware
Subscribe
Nj301-1100
Subscribe
Nj301-1100 Firmware
Subscribe
Nj301-1200
Subscribe
Nj301-1200 Firmware
Subscribe
Nj501-1300
Subscribe
Nj501-1300 Firmware
Subscribe
Nj501-1320
Subscribe
Nj501-1320 Firmware
Subscribe
Nj501-1340
Subscribe
Nj501-1340 Firmware
Subscribe
Nj501-1400
Subscribe
Nj501-1400 Firmware
Subscribe
Nj501-1420
Subscribe
Nj501-1420 Firmware
Subscribe
Nj501-1500
Subscribe
Nj501-1500 Firmware
Subscribe
Nj501-1520
Subscribe
Nj501-1520 Firmware
Subscribe
Nj501-4300
Subscribe
Nj501-4300 Firmware
Subscribe
Nj501-4320
Subscribe
Nj501-4320 Firmware
Subscribe
Nj501-4400
Subscribe
Nj501-4400 Firmware
Subscribe
Nj501-4500
Subscribe
Nj501-4500 Firmware
Subscribe
Nj501-5300
Subscribe
Nj501-5300-1
Subscribe
Nj501-5300-1 Firmware
Subscribe
Nj501-5300 Firmware
Subscribe
Nx701-1600
Subscribe
Nx701-1600 Firmware
Subscribe
Nx701-1620
Subscribe
Nx701-1620 Firmware
Subscribe
Nx701-1700
Subscribe
Nx701-1700 Firmware
Subscribe
Nx701-1720
Subscribe
Nx701-1720 Firmware
Subscribe
Nx701-z600
Subscribe
Nx701-z600 Firmware
Subscribe
Nx701-z700
Subscribe
Nx701-z700 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52790 | The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T07:11:39.676Z
Reserved: 2022-05-18T00:00:00
Link: CVE-2022-31206
No data.
Status : Modified
Published: 2022-07-26T22:15:11.400
Modified: 2024-11-21T07:04:07.527
Link: CVE-2022-31206
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD