VAR-202207-0036

Vulnerability from variot - Updated: 2024-08-14 14:49

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. are all products of Japan's Omron (Omron). A remote attacker could exploit this vulnerability to bypass the authentication process

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0036",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nx1w-cif01",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-5300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1140dt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-1520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-1600",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nj501-r520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-1500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r420",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-15w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nj501-1420",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj-pd3001",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-1020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-9024dt1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-9000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-z600",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx102-1200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-1300",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "sysmac studio",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.49"
      },
      {
        "model": "nj501-1320",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4310",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-7w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nj501-140",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-12w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nx102-1020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj301-1100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-mab221",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-1720",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx701-z700",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx701-1620",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "nx1w-cif12",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1040dt1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj101-9020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj301-1200",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj-pa3001",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-adb21",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4400",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1220",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-9024dt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-cif11",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-4320",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-9020",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1040dt",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "na5-9w",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.15"
      },
      {
        "model": "nj501-1340",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx102-1120",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r400",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1p2-1140dt1",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nj501-r320",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx1w-dab21v",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.48"
      },
      {
        "model": "nx701-1700",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.28"
      },
      {
        "model": "\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 sysmac studio",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "\u30d7\u30ed\u30b0\u30e9\u30de\u30d6\u30eb\u30bf\u30fc\u30df\u30ca\u30eb na \u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nx \u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "\u30de\u30b7\u30f3\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9 nj \u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "cve": "CVE-2022-33208",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2022-33208",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-426449",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2022-33208",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2022-002691",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-33208",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2022-002691",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202207-355",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-426449",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2022-33208",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software \u0027Sysmac Studio\u0027 all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software \u0027Sysmac Studio\u0027 and/or a Programmable Terminal (PT) to access the controller. * Using hardcoded credentials ( CWE-798 ) - CVE-2022-34151 It was * Capture-Replay Authentication evasion by ( CWE-294 ) - CVE-2022-33208 It was * Presence of debug code available ( CWE-489 ) - CVE-2022-33971 This vulnerability information is provided by the developer for the purpose of dissemination to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developer.The potential impact will vary for each vulnerability, but may include: * Unauthorized access to the controller product by a third party who has obtained authentication information by analyzing the product in advance. - CVE-2022-33208 It was * Disruption of service operation ( DoS ) attacks and malicious programs are executed - CVE-2022-33971. are all products of Japan\u0027s Omron (Omron). A remote attacker could exploit this vulnerability to bypass the authentication process",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-33208",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVNVU97050784",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691",
        "trust": 1.4
      },
      {
        "db": "USCERT",
        "id": "AA22-103A",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355",
        "trust": 0.7
      },
      {
        "db": "CS-HELP",
        "id": "SB2022070405",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-426449",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "id": "VAR-202207-0036",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:49:43.088000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "machine automation controller \u00a0NJ/NX\u00a0 Authentication Bypass Vulnerability in Communication Function of Series Omron Corporation",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/vulnerability/OMSR-2022-001_ja.pdf"
      },
      {
        "title": "Multiple Omron Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=200205"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-294",
        "trust": 1.1
      },
      {
        "problemtype": "Capture-replay authentication evasion by (CWE-294) [ others ]",
        "trust": 0.8
      },
      {
        "problemtype": " debug code in active state (CWE-489) [ others ]",
        "trust": 0.8
      },
      {
        "problemtype": " Use hard-coded credentials (CWE-798) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://jvn.jp/en/vu/jvnvu97050784/index.html"
      },
      {
        "trust": 1.8,
        "url": "https://www.ia.omron.com/product/vulnerability/omsr-2022-001_en.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu97050784/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34151"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33208"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33971"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-103a"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022070405"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-33208/"
      },
      {
        "trust": 0.6,
        "url": "https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-002691.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/294.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-07-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "date": "2022-07-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "date": "2022-11-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "date": "2022-07-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "date": "2022-07-04T02:15:07.570000",
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-07-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-426449"
      },
      {
        "date": "2022-07-15T00:00:00",
        "db": "VULMON",
        "id": "CVE-2022-33208"
      },
      {
        "date": "2022-11-09T08:53:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      },
      {
        "date": "2022-11-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      },
      {
        "date": "2022-07-15T17:06:55.383000",
        "db": "NVD",
        "id": "CVE-2022-33208"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple vulnerabilities in multiple Omron products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002691"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202207-355"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…