Published:2025/01/14  Last Updated:2025/05/07

JVNVU#96335720
OMRON NJ/NX series vulnerable to path traversal

Overview

OMRON NJ/NX series contain a path traversal vulnerability.

Products Affected

Machine Automation Controller NJ-series:

  • NJ101-[][][][], NJ301-[][][][], NJ501-1[]0[]
    • Ver.1.64.05 and earlier
      • Lot No. 30924(September 30, 2024) and earlier(*1)
  • NJ501-1[]2[], NJ501-1340, NJ501-4[][][], NJ501-5300, NJ501-R[][][]
    • Ver.1.64.04 and earlier
      • Lot No.30924(September 30, 2024) and earlier(*1)
Refer to the developer's advisory "Appendix" section regarding how to check the affected versions.
(*1)Refer to "ID Information Indication" section of the below manuals provided by the developer
NJ-series CPU unit Hardware User’s Manual (W500)

 
Machine Automation Controller NX-series:
  • NX1P2-[][][][][][], NX1P2-[][][][][][]1
    • Ver.1.64.04 and earlier
      • Lot No.19Y24(November 19, 2024) and earlier(*2)
  • NX102-[][]0[]
    • Ver.1.64.07or earlier
      • Lot No.12225(February12, 2025) and earlier(*2)
  • NX102-[][]2[]
    • Ver.1.64.07or earlier
      • Lot No.24425(April 24 , 2025) and earlier(*2)
  • NX502-[][][][]
    • Ver.1.66.03 or earlier
      • Lot No.24425(April 24 , 2025)(*2)
  • NX701-[][][][]
    • Ver.1.35.04 or earlier
      • Lot No.24425(April 24 , 2025)(*2) 
  • NX-EIP201
    • Ver.1.01.02 or earlier
      • Lot No.24425(April 24 , 2025)(*2) 
Refer to the developer's advisory "Appendix" section regarding how to check the affected versions.
(*2)Refer to "ID Information Indication" section of the manuals provided by the developer listed below.
NX102 CPU Unit User’s Manual (Hardware) (W578)
NX1P2 CPU Unit User’s Manual (Hardware) (W578)
NX5 CPU Unit User’s Manual (Hardware) (W578)
NX7 CPU Unit User’s Manual (Hardware) (W578)
NX-EIP201 EtherNet/IPTM Unit User’s Manual (W578)
 
As for the details, refer to the information provided by the developer.

Description

Machine Automation Controller NJ/NX series provided by OMRON Corporation contain a path traversal vulnerability (CWE-22, CVE-2024-12083).

Impact

An arbitrary file in the affected product may be accessed or arbitrary code may be executed by processing a specially crafted request sent from a remote attacker with an administrative privilege.

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.
As for how to obtain the update or how to apply the update, refer to the information provided by the developer.

Apply the workaround
The developer recommends that the users should use 'Secure Communication Function' which are implemented in the following products/versions.

  • NJ series, NX102, NX1P2 CPU Unit: Version 1.49 or later
  • NX701 CPU Unit: Version 1.29 or later
  • NX502 CPU Unit: Version 1.60 or later
  • NX-EIP201 EtherNet/IPTM Unit: Version 1.00 or later
As for the details, refer to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score: 6.6
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

OMRON Corporation reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia

Update History

2025/05/07
Updated the information under [Products Affected] and [Solution]