Omron CX-Programmer up to 9.78 CX-P.exe out-of-bounds write
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.9 | $0-$5k | 0.00 |
A vulnerability, which was classified as critical, has been found in Omron CX-Programmer up to 9.78 (SCADA Software). Affected by this issue is an unknown code block of the file CX-P.exe. The manipulation with an unknown input leads to a out-of-bounds write vulnerability. Using CWE to declare the problem leads to CWE-787. The product writes data past the end, or before the beginning, of the intended buffer. Impacted is confidentiality, integrity, and availability.
The weakness was disclosed 10/05/2022 as icsa-22-277-04. The advisory is shared for download at cisa.gov. This vulnerability is handled as CVE-2022-3398. Successful exploitation requires user interaction by the victim. There are known technical details, but no exploit is available.
Upgrading to version 9.79 eliminates this vulnerability.
Product
Type
Vendor
Name
Version
- 9.0
- 9.1
- 9.2
- 9.3
- 9.4
- 9.5
- 9.6
- 9.7
- 9.8
- 9.9
- 9.10
- 9.11
- 9.12
- 9.13
- 9.14
- 9.15
- 9.16
- 9.17
- 9.18
- 9.19
- 9.20
- 9.21
- 9.22
- 9.23
- 9.24
- 9.25
- 9.26
- 9.27
- 9.28
- 9.29
- 9.30
- 9.31
- 9.32
- 9.33
- 9.34
- 9.35
- 9.36
- 9.37
- 9.38
- 9.39
- 9.40
- 9.41
- 9.42
- 9.43
- 9.44
- 9.45
- 9.46
- 9.47
- 9.48
- 9.49
- 9.50
- 9.51
- 9.52
- 9.53
- 9.54
- 9.55
- 9.56
- 9.57
- 9.58
- 9.59
- 9.60
- 9.61
- 9.62
- 9.63
- 9.64
- 9.65
- 9.66
- 9.67
- 9.68
- 9.69
- 9.70
- 9.71
- 9.72
- 9.73
- 9.74
- 9.75
- 9.76
- 9.77
- 9.78
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.0VulDB Meta Temp Score: 7.9
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CNA Base Score: 7.8
CNA Vector (ICS-CERT): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Out-of-bounds writeCWE: CWE-787 / CWE-119
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: CX-Programmer 9.79
Timeline
10/03/2022 🔍10/05/2022 🔍
10/05/2022 🔍
10/30/2022 🔍
Sources
Advisory: icsa-22-277-04Status: Confirmed
CVE: CVE-2022-3398 (🔍)
Entry
Created: 10/05/2022 09:39Updated: 10/30/2022 08:24
Changes: 10/05/2022 09:39 (40), 10/30/2022 08:21 (2), 10/30/2022 08:24 (21)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.