Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU92193064/ | Third Party Advisory |
https://www.ia.omron.com/product/vulnerability/OMSR-2023-006_en.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
History
17 Oct 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1284 |
11 Aug 2023, 21:01
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.ia.omron.com/product/vulnerability/OMSR-2023-006_en.pdf - Vendor Advisory | |
References | (MISC) https://jvn.jp/en/vu/JVNVU92193064/ - Third Party Advisory | |
CWE | NVD-CWE-Other | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:omron:cj2m-cpu33_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:omron:cs1w-eip21_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:omron:cj1w-eip21_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2m-cpu31_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2h-cpu66-eip:-:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2m-cpu34:-:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2h-cpu64-eip:-:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2h-cpu65-eip:-:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2h-cpu64-eip_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2h-cpu68-eip:-:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2m-cpu35:-:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2m-cpu33:-:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2h-cpu67-eip:-:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2m-cpu34_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2h-cpu66-eip_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2m-cpu32:-:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2h-cpu65-eip_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:omron:cj2m-cpu31:-:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2m-cpu32_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:omron:cs1w-eip21:-:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2m-cpu35_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2h-cpu68-eip_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:omron:cj1w-eip21:-:*:*:*:*:*:*:* cpe:2.3:o:omron:cj2h-cpu67-eip_firmware:*:*:*:*:*:*:*:* |
03 Aug 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-03 05:15
Updated : 2024-10-17 16:35
NVD link : CVE-2023-38744
Mitre link : CVE-2023-38744
CVE.ORG link : CVE-2023-38744
JSON object : View
Products Affected
omron
- cj2h-cpu66-eip
- cj2m-cpu34
- cj2h-cpu65-eip
- cj2m-cpu33_firmware
- cj1w-eip21_firmware
- cj2h-cpu66-eip_firmware
- cj2m-cpu35_firmware
- cj2m-cpu32
- cj2m-cpu32_firmware
- cj2m-cpu33
- cj2m-cpu31
- cj2m-cpu31_firmware
- cj2h-cpu67-eip
- cj2m-cpu34_firmware
- cj2h-cpu68-eip
- cj2h-cpu67-eip_firmware
- cs1w-eip21_firmware
- cj2h-cpu65-eip_firmware
- cj2m-cpu35
- cj2h-cpu64-eip_firmware
- cj2h-cpu64-eip
- cj2h-cpu68-eip_firmware
- cj1w-eip21
- cs1w-eip21
CWE