JVNVU#96335720
OMRON NJ/NX series vulnerable to path traversal
Overview
OMRON NJ/NX series contain a path traversal vulnerability.
Products Affected
Machine Automation Controller NJ-series:
- NJ101-[][][][], NJ301-[][][][], NJ501-1[]0[]
- Ver.1.64.05 and earlier
- Lot No. 30924(September 30, 2024) and earlier(*1)
- Ver.1.64.05 and earlier
- NJ501-1[]2[], NJ501-1340, NJ501-4[][][], NJ501-5300, NJ501-R[][][]
- Ver.1.64.04 and earlier
- Lot No.30924(September 30, 2024) and earlier(*1)
- Ver.1.64.04 and earlier
(*1)Refer to "ID Information Indication" section of the below manuals provided by the developer
NJ-series CPU unit Hardware User’s Manual (W500)
- NX1P2-[][][][][][], NX1P2-[][][][][][]1
- Ver.1.64.04 and earlier
- Lot No.19Y24(November 19, 2024) and earlier(*2)
- Ver.1.64.04 and earlier
- NX102-[][]0[]
- Ver.1.64.07or earlier
- Lot No.12225(February12, 2025) and earlier(*2)
- Ver.1.64.07or earlier
- NX102-[][]2[]
- Ver.1.64.07or earlier
- Lot No.24425(April 24 , 2025) and earlier(*2)
- Ver.1.64.07or earlier
- NX502-[][][][]
- Ver.1.66.03 or earlier
- Lot No.24425(April 24 , 2025)(*2)
- Ver.1.66.03 or earlier
- NX701-[][][][]
- Ver.1.35.04 or earlier
- Lot No.24425(April 24 , 2025)(*2)
- Ver.1.35.04 or earlier
- NX-EIP201
- Ver.1.01.02 or earlier
- Lot No.24425(April 24 , 2025)(*2)
- Ver.1.01.02 or earlier
(*2)Refer to "ID Information Indication" section of the manuals provided by the developer listed below.
NX102 CPU Unit User’s Manual (Hardware) (W578)
NX1P2 CPU Unit User’s Manual (Hardware) (W578)
NX5 CPU Unit User’s Manual (Hardware) (W578)
NX7 CPU Unit User’s Manual (Hardware) (W578)
NX-EIP201 EtherNet/IPTM Unit User’s Manual (W578)
Description
Machine Automation Controller NJ/NX series provided by OMRON Corporation contain a path traversal vulnerability (CWE-22, CVE-2024-12083).
Impact
An arbitrary file in the affected product may be accessed or arbitrary code may be executed by processing a specially crafted request sent from a remote attacker with an administrative privilege.
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
As for how to obtain the update or how to apply the update, refer to the information provided by the developer.
Apply the workaround
The developer recommends that the users should use 'Secure Communication Function' which are implemented in the following products/versions.
- NJ series, NX102, NX1P2 CPU Unit: Version 1.49 or later
- NX701 CPU Unit: Version 1.29 or later
- NX502 CPU Unit: Version 1.60 or later
- NX-EIP201 EtherNet/IPTM Unit: Version 1.00 or later
Vendor Status
Vendor | Link |
OMRON Corporation | Path Traversal Vulnerabilities in NJ/NX-series Machine Automation Controllers |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
Update History
- 2025/05/07
- Updated the information under [Products Affected] and [Solution]