ICS/OT

High-Severity Vulnerabilities Patched in Omron PLC Programming Software

Several high-severity vulnerabilities that can be exploited for remote code execution were patched recently in the CX-Programmer software of Japanese electronics giant Omron.

<p><strong><span><span>Several high-severity vulnerabilities that can be exploited for remote code execution were patched recently in the CX-Programmer software of Japanese electronics giant Omron.</span></span></strong></p>

Several high-severity vulnerabilities that can be exploited for remote code execution were patched recently in the CX-Programmer software of Japanese electronics giant Omron.

An advisory released earlier this month by Japan’s JPCERT/CC revealed that the product is affected by five use-after-free and out-of-bounds vulnerabilities, all with a CVSS score of 7.8.

CX-Programmer, which is part of Omron’s CX-One automation software suite, is designed for programming and debugging Omron programmable logic controllers (PLCs). According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the product is used worldwide, including in the critical manufacturing sector.

The CX-Programmer vulnerabilities affect version 9.76.1 and earlier. The flaws were discovered by security researcher Michael Heinzl, who told SecurityWeek that his findings were reported to the vendor in May and June 2021 through JPCERT/CC.

Learn more about vulnerabilities in industrial systems at SecurityWeek’s ICS Cyber Security Conference

The researcher said the vulnerabilities were caused by the lack of proper data validation and successful exploitation could lead to information disclosure or arbitrary code execution. However, exploitation requires user interaction — for example, tricking the targeted user into opening a specially crafted CXP file.

Heinzl has released advisories for each security hole. CVE identifiers have been assigned to each issue.

According to JPCERT/CC, the vulnerabilities were patched in CX-Programmer 9.77, which appears to have been released in January. JPCERT/CC pointed out that the CX-One suite has an auto update feature and most users will not need to take any action to apply the patches. However, users are advised to ensure that the automatic updates are working properly and to contact the vendor if they are having issues with the feature.

Advertisement. Scroll to continue reading.

CISA has yet to publish an advisory for these vulnerabilities, but the agency typically does inform organizations in the United States about security holes in Omron products.

Heinzl previously identified vulnerabilities in Fuji Electric’s Tellus factory monitoring and operating product, Delta Electronics’ DIAEnergie industrial energy management system, and the myPRO HMI/SCADA product of Czech industrial automation company mySCADA.

Related: Realistic Factory Honeypot Shows Threats Faced by Industrial Organizations

Related: Critical Industries at Risk from Eleven Zero-day Flaws in Real Time Operating System

Related: Flaws in Omron HMI Product Exploitable via Malicious Project Files

Related Content

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

ICS/OT

In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that...

ICS/OT

SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.

ICS/OT

Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.

ICS/OT

The Municipal Water Authority of Aliquippa was just one of multiple organizations breached in the U.S. by Iran-linked "Cyber Av3ngers" hackers

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS/OT

Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version