{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-45790","assignerOrgId":"12bdf821-1545-4a87-aac5-61670cc6fcef","state":"PUBLISHED","assignerShortName":"Dragos","dateReserved":"2022-11-22T17:52:43.198Z","datePublished":"2024-01-22T17:22:14.476Z","dateUpdated":"2024-11-13T16:53:38.204Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"CJ-series and CS-series CPU modules","vendor":"Omron","versions":[{"lessThan":"1.5","status":"affected","version":"CJ2H 0.0","versionType":"custom"},{"lessThan":"2.1","status":"affected","version":"CJ2M 0.0","versionType":"custom"},{"lessThan":"4.1","status":"affected","version":"CJ1G 0.0","versionType":"custom"},{"lessThan":"4.1","status":"affected","version":"CS1H 0.0","versionType":"custom"},{"lessThan":"4.1","status":"affected","version":"CS1G 0.0","versionType":"custom"},{"lessThan":"1.4","status":"affected","version":"CS1D-H 0.0","versionType":"custom"},{"lessThan":"1.3","status":"affected","version":"CP1E-E 0.0","versionType":"custom"},{"lessThan":"1.3","status":"affected","version":"CP1E-N 0.0","versionType":"custom"},{"lessThan":"1.4","status":"affected","version":"CS1D-P 0.0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic."}],"value":"The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic."}],"impacts":[{"capecId":"CAPEC-629","descriptions":[{"lang":"en","value":"CAPEC-629 Unauthorized Use of Device Resources"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-307","description":"CWE-307 Improper Restriction of Excessive Authentication Attempts","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"12bdf821-1545-4a87-aac5-61670cc6fcef","shortName":"Dragos","dateUpdated":"2024-01-22T17:22:14.476Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05"},{"url":"https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-010_en.pdf"},{"url":"https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/"}],"source":{"discovery":"UNKNOWN"},"title":"Omron FINS memory protection susceptible to bruteforce","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:17:04.118Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-05","tags":["x_transferred"]},{"url":"https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-010_en.pdf","tags":["x_transferred"]},{"url":"https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-25T20:23:52.957365Z","id":"CVE-2022-45790","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-13T16:53:38.204Z"}}]}}