Vulnerability Details : CVE-2015-0987
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 rely on cleartext password transmission, which allows remote attackers to obtain sensitive information by sniffing the network during a PLC unlock request.
Products affected by CVE-2015-0987
- cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*
- cpe:2.3:h:omron:cj2h_plc:*:*:*:*:*:*:*:*
- cpe:2.3:h:omron:cj2m_plc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-0987
0.82%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-0987
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-0987
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-0987
-
https://ics-cert.us-cert.gov/advisories/ICSA-15-274-01
Omron Multiple Product Vulnerabilities | CISAThird Party Advisory;US Government Resource
Jump to