Vulnerability Details : CVE-2022-31205
In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the Web UI is stored in memory area D1449...D1452 and can be read out using the Omron FINS protocol without any further authentication.
Products affected by CVE-2022-31205
- cpe:2.3:o:omron:sysmac_cs1_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:omron:sysmac_cj2m_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:omron:sysmac_cj2h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:omron:sysmac_cp1e_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:omron:sysmac_cp1h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:omron:sysmac_cp1l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:omron:cp1w-cif41_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31205
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-31205
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-31205
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-31205
-
https://www.forescout.com/blog/
Blog - ForescoutThird Party Advisory
-
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-02
Omron SYSMAC CS/CJ/CP Series and NJ/NX Series | CISAThird Party Advisory;US Government Resource
Jump to