Published:2022/11/25  Last Updated:2022/11/25

JVNVU#92877622
Multiple vulnerabilities in OMRON CX-Programmer

Overview

OMRON CX-Programmer contains multiple vulnerabilities.

Products Affected

  • CX-Programmer v.9.77 and earlier

Description

CX-Programmer provided by Omron Corporation contains multiple vulnerabilities listed below.

  • Use-after-free (CWE-416) - CVE-2022-43508
    CVSS v3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score: 7.8
  • Out-of-bounds Write (CWE-787) - CVE-2022-43509
    CVSS v3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score: 7.8
  • Stack-based Buffer Overflow (CWE-121) - CVE-2022-43667
    CVSS v3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score: 7.8

Impact

By having a user to open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur.

Solution

Update the Software
Update for CX-One suite is applied by its Auto Update function, therefore it is not necessary for the users to take any actions.
The developer recommends the users to contact the developer and/or the sales representatives if there are any issues with Auto Update.
The version that contains the fix for this vulnerability is as follows.

  • CX-Programmer Ver.9.79
For more information, refer to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
OMRON Corporation Vulnerable 2022/11/25

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2022-43508
CVE-2022-43509
CVE-2022-43667
JVN iPedia