Several high-severity vulnerabilities that can be exploited for remote code execution were patched recently in the CX-Programmer software of Japanese electronics giant Omron.
An advisory released earlier this month by Japan’s JPCERT/CC revealed that the product is affected by five use-after-free and out-of-bounds vulnerabilities, all with a CVSS score of 7.8.
CX-Programmer, which is part of Omron’s CX-One automation software suite, is designed for programming and debugging Omron programmable logic controllers (PLCs). According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the product is used worldwide, including in the critical manufacturing sector.
The CX-Programmer vulnerabilities affect version 9.76.1 and earlier. The flaws were discovered by security researcher Michael Heinzl, who told SecurityWeek that his findings were reported to the vendor in May and June 2021 through JPCERT/CC.
Learn more about vulnerabilities in industrial systems at SecurityWeek’s ICS Cyber Security Conference
The researcher said the vulnerabilities were caused by the lack of proper data validation and successful exploitation could lead to information disclosure or arbitrary code execution. However, exploitation requires user interaction — for example, tricking the targeted user into opening a specially crafted CXP file.
Heinzl has released advisories for each security hole. CVE identifiers have been assigned to each issue.
According to JPCERT/CC, the vulnerabilities were patched in CX-Programmer 9.77, which appears to have been released in January. JPCERT/CC pointed out that the CX-One suite has an auto update feature and most users will not need to take any action to apply the patches. However, users are advised to ensure that the automatic updates are working properly and to contact the vendor if they are having issues with the feature.
CISA has yet to publish an advisory for these vulnerabilities, but the agency typically does inform organizations in the United States about security holes in Omron products.
Heinzl previously identified vulnerabilities in Fuji Electric’s Tellus factory monitoring and operating product, Delta Electronics’ DIAEnergie industrial energy management system, and the myPRO HMI/SCADA product of Czech industrial automation company mySCADA.
Related: Realistic Factory Honeypot Shows Threats Faced by Industrial Organizations
Related: Critical Industries at Risk from Eleven Zero-day Flaws in Real Time Operating System
Related: Flaws in Omron HMI Product Exploitable via Malicious Project Files