Omron NJ/NX-series Machine Automation Controllers Use of Hard-Coded Credentials (CVE-2022-34151)

high Tenable OT Security Plugin ID 501147

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Omron recommends the following:

- NX7-series Machine Automation Controller: Update to version 1.29 or higher
- NX1-series Machine Automation Controller: Update to version 1.50 or higher
- NJ-series Machine Automation Controller (NJ501-1300, NJ501-1400, NJ501-1500): Update to version 1.49 or higher
- NJ-series Machine Automation Controller (All other models): Update to version 1.50 or higher
- Automation Software Sysmac Studio: Update to version 1.50 or higher
- NA-series Programable Terminal: Update to runtime version 1.16 or higher

For information on how to obtain and update firmware for the countermeasure version of the product, contact Omron sales office or distributors. Users can update the Sysmac Studio to the latest versions using the installed Omron Automation Software AutoUpdate tool.

Omron recommends customers take the following mitigation measures to minimize the risk of exploitation of this vulnerability:

Enable antivirus protection

- Protect any PC with access to the control system against malware by ensuring the installation and maintenance of up- to-date commercial grade antivirus software protection.

Implement security measures to prevent unauthorized access:

- Minimize connection of control systems and equipment to open networks preventing untrusted devices from accessing them.
- Implement firewalls by shutting down unused communications ports, limiting communications between hosts, and isolate affected systems from the IT network.
- Use a virtual private network (VPN) for remote access to control systems and equipment.
- Use strong passwords and change passwords frequently.
- Install physical controls that only permit authorized personnel access to control systems and equipment.
- Scan USB drives or similar devices for viruses and malware to ensure the devices are safe before connecting them to systems and devices.
- When possible, enforce multifactor authentication (MFA) on all devices with remote access to control systems and equipment.

Protect data input and output:

- Perform process validation, such as backup validation or range checks, to cope with unintentional modification of input/output data to control systems and devices.

Use data recovery:

- Conduct periodical data backups and maintenance to prepare for potential data loss.

For more information see Omron’s advisory: OMSR-2022-001

This vulnerability and countermeasures correspond to the those reported in the CISA ICS Alert: APT Cyber Tools Targeting ICS/SCADA Devices.

See Also

https://www.ia.omron.com/product/vulnerability/OMSR-2022-001_en.pdf

https://jvn.jp/en/vu/JVNVU97050784/index.html

https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-08

Plugin Details

Severity: High

ID: 501147

Version: 1.6

Type: remote

Family: Tenable.ot

Published: 5/22/2023

Updated: 3/4/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-34151

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:omron:nj101-1000_firmware, cpe:/o:omron:nj101-1020_firmware, cpe:/o:omron:nj101-9000_firmware, cpe:/o:omron:nj101-9020_firmware, cpe:/o:omron:nj301-1100_firmware, cpe:/o:omron:nj301-1200_firmware, cpe:/o:omron:nj501-1300_firmware, cpe:/o:omron:nj501-1320_firmware, cpe:/o:omron:nj501-1340_firmware, cpe:/o:omron:nj501-140_firmware, cpe:/o:omron:nj501-1420_firmware, cpe:/o:omron:nj501-1500_firmware, cpe:/o:omron:nj501-1520_firmware, cpe:/o:omron:nj501-4300_firmware, cpe:/o:omron:nj501-4310_firmware, cpe:/o:omron:nx1w-mab221_firmware, cpe:/o:omron:nx701-1600_firmware, cpe:/o:omron:nx701-1620_firmware, cpe:/o:omron:nx701-1700_firmware, cpe:/o:omron:nx701-1720_firmware, cpe:/o:omron:nx701-z600_firmware, cpe:/o:omron:nx701-z700_firmware, cpe:/o:omron:nj501-4320_firmware, cpe:/o:omron:nj501-4400_firmware, cpe:/o:omron:nj501-4500_firmware, cpe:/o:omron:nj501-5300_firmware, cpe:/o:omron:nj501-r300_firmware, cpe:/o:omron:nj501-r320_firmware, cpe:/o:omron:nj501-r400_firmware, cpe:/o:omron:nj501-r420_firmware, cpe:/o:omron:nj501-r500_firmware, cpe:/o:omron:nj501-r520_firmware, cpe:/o:omron:nx102-1000_firmware, cpe:/o:omron:nx102-1020_firmware, cpe:/o:omron:nx102-1100_firmware, cpe:/o:omron:nx102-1120_firmware, cpe:/o:omron:nx102-1200_firmware, cpe:/o:omron:nx102-1220_firmware, cpe:/o:omron:nx102-9020_firmware, cpe:/o:omron:nx1p2-1040dt1_firmware, cpe:/o:omron:nx1p2-1040dt_firmware, cpe:/o:omron:nx1p2-1140dt1_firmware, cpe:/o:omron:nx1p2-1140dt_firmware, cpe:/o:omron:nx1p2-9024dt1_firmware, cpe:/o:omron:nx1p2-9024dt_firmware, cpe:/o:omron:nx1w-adb21_firmware, cpe:/o:omron:nx1w-cif01_firmware, cpe:/o:omron:nx1w-cif11_firmware, cpe:/o:omron:nx1w-cif12_firmware, cpe:/o:omron:nx1w-dab21v_firmware

Required KB Items: Tenable.ot/Omron

Exploit Ease: No known exploits are available

Patch Publication Date: 7/4/2022

Vulnerability Publication Date: 7/4/2022

Reference Information

CVE: CVE-2022-34151

CWE: 294