Omron CX-One CX-Programmer, CJ2M and CJ2H PLCs Exposure of Sensitive Information to an Unauthorized Actor (CVE-2015-1015)

medium Tenable OT Security Plugin ID 500185

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 use a reversible format for password storage in object files on Compact Flash cards, which makes it easier for local users to obtain sensitive information by reading a file.

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://ics-cert.us-cert.gov/advisories/ICSA-15-274-01

Plugin Details

Severity: Medium

ID: 500185

Version: 1.6

Type: remote

Family: Tenable.ot

Published: 2/7/2022

Updated: 12/14/2023

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2015-1015

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:omron:cj2m_plc:2.0, cpe:/h:omron:cj2h_plc:1.4

Required KB Items: Tenable.ot/Omron

Exploit Ease: No known exploits are available

Patch Publication Date: 10/6/2015

Vulnerability Publication Date: 10/6/2015

Reference Information

CVE: CVE-2015-1015

CWE: 200