Threat Encyclopedia



This indicates an attack attempt to exploit a Memory Corruption Vulnerability in OMRON CX-One CX-Protocol.
A remote attacker may exploit this vulnerability by enticing the victim to open a CX-Protocol application with the crafted project file using the vulnerable version of the software. Successful exploitation could lead to code execution under the security context of the user. Unsuccessful exploitation would lead to a hang or termination of the application.

affected-products-logoAffected Products

OMRON CX-One CX-Protocol Versions 2.0 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the ICS-CERT advisory for updates.

CVE References


Other References


Telemetry logoTelemetry