ID

VAR-202209-0069


CVE

CVE-2022-2979


TITLE

Made by Omron  CX-Programmer  Freed memory usage in ( use-after-free ) vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-002344

DESCRIPTION

Opening a specially crafted file could cause the affected product to fail to release its memory reference potentially resulting in arbitrary code execution. Provided by Omron Corporation CX-Programmer freed memory usage ( use-after-free ) vulnerability ( CWE-416 , CVE-2022-2979 ) Exists. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. Omron CX-Programmer is a PLC (Programmable Logic Controller) programming software developed by Japan's Omron Corporation. Omron CX-Programmer

Trust: 1.8

sources: NVD: CVE-2022-2979 // JVNDB: JVNDB-2022-002344 // VULHUB: VHN-428673 // VULMON: CVE-2022-2979

AFFECTED PRODUCTS

vendor:omronmodel:cx-programmerscope:ltversion:9.78

Trust: 1.0

vendor:オムロン株式会社model:cx-programmerscope:eqversion: -

Trust: 0.8

vendor:オムロン株式会社model:cx-programmerscope:ltversion:9.78 earlier

Trust: 0.8

sources: JVNDB: JVNDB-2022-002344 // NVD: CVE-2022-2979

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-2979
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-2979
value: HIGH

Trust: 1.0

OTHER: JVNDB-2022-002344
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202209-737
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-2979
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-002344
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-002344 // CNNVD: CNNVD-202209-737 // NVD: CVE-2022-2979 // NVD: CVE-2022-2979

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:Use of freed memory (CWE-416) [ others ]

Trust: 0.8

sources: VULHUB: VHN-428673 // JVNDB: JVNDB-2022-002344 // NVD: CVE-2022-2979

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202209-737

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202209-737

PATCH

title:CX-One  Version upgrade   Program: Support Tool: Omron Omron Corporationurl:https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html

Trust: 0.8

title:Omron CX-Programmer Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=207869

Trust: 0.6

sources: JVNDB: JVNDB-2022-002344 // CNNVD: CNNVD-202209-737

EXTERNAL IDS

db:NVDid:CVE-2022-2979

Trust: 3.4

db:ICS CERTid:ICSA-22-242-09

Trust: 2.6

db:JVNid:JVNVU90019919

Trust: 0.8

db:JVNDBid:JVNDB-2022-002344

Trust: 0.8

db:CNNVDid:CNNVD-202209-737

Trust: 0.7

db:VULHUBid:VHN-428673

Trust: 0.1

db:VULMONid:CVE-2022-2979

Trust: 0.1

sources: VULHUB: VHN-428673 // VULMON: CVE-2022-2979 // JVNDB: JVNDB-2022-002344 // CNNVD: CNNVD-202209-737 // NVD: CVE-2022-2979

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-09

Trust: 2.6

url:http://jvn.jp/vu/jvnvu90019919/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-2979

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-2979/

Trust: 0.6

sources: VULHUB: VHN-428673 // VULMON: CVE-2022-2979 // JVNDB: JVNDB-2022-002344 // CNNVD: CNNVD-202209-737 // NVD: CVE-2022-2979

SOURCES

db:VULHUBid:VHN-428673
db:VULMONid:CVE-2022-2979
db:JVNDBid:JVNDB-2022-002344
db:CNNVDid:CNNVD-202209-737
db:NVDid:CVE-2022-2979

LAST UPDATE DATE

2024-08-14T14:17:43.758000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-428673date:2022-09-15T00:00:00
db:JVNDBid:JVNDB-2022-002344date:2024-06-13T03:31:00
db:CNNVDid:CNNVD-202209-737date:2022-09-16T00:00:00
db:NVDid:CVE-2022-2979date:2022-09-15T19:27:21.957

SOURCES RELEASE DATE

db:VULHUBid:VHN-428673date:2022-09-12T00:00:00
db:JVNDBid:JVNDB-2022-002344date:2022-09-01T00:00:00
db:CNNVDid:CNNVD-202209-737date:2022-09-12T00:00:00
db:NVDid:CVE-2022-2979date:2022-09-12T21:15:10.230