This indicates an attack attempt to exploit a Memory Corruption Vulnerability in OMRON CX-One CX-Protocol.
A remote attacker may exploit this vulnerability by enticing the victim to open a CX-Protocol application with the crafted project file using the vulnerable version of the software. Successful exploitation could lead to code execution under the security context of the user. Unsuccessful exploitation would lead to a hang or termination of the application.
OMRON CX-One CX-Protocol Versions 2.0 and prior
System Compromise: Remote attackers can gain control of vulnerable systems.
Refer to the ICS-CERT advisory for updates.