Omron NJ/NX-series Machine Automation Controllers Active Debug Code (CVE-2022-33971)

high Tenable OT Security Plugin ID 501152

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Omron recommends updating versions of NJ/NX-series machine automation controllers to address this vulnerability. These updates are available to users by contacting their Omron or distributors:

- NX7-series Machine Automation Controller (All Models): Versions 1.29 or higher
- NX1-series Machine Automation Controller (All Models): Versions 1.50 or higher
- NJ-series Machine Automation Controller (NJ501-1300, NJ501-1400, NJ501-1500): Versions 1.49 or higher
- NJ-series Machine Automation Controller (All other Models): Versions 1.50 or higher

Omron recommends users take the following mitigation measures to minimize the risk of exploitation of this vulnerability:

Enable antivirus protection:

- Protect any PC with access to the control system against malware by ensuring the installation and maintenance of up- to-date commercial grade antivirus software protection.

Implement security measures to prevent unauthorized access:

- Minimize connection of control systems and equipment to open networks preventing untrusted devices from accessing them.
- Implement firewalls by shutting down unused communications ports, limiting communications between hosts, and isolate affected systems from the IT network.
- Use a virtual private network (VPN) for remote access to control systems and equipment.
- Use strong passwords and change passwords frequently.
- Install physical controls that only permit authorized personnel access to control systems and equipment.
- Scan USB drives or similar devices for viruses and malware to ensure the devices are safe before connecting them to systems and devices.
- When possible, enforce multifactor authentication (MFA) on all devices with remote access to control systems and equipment.

Protect data input and output:

- Perform process validation, such as backup validation or range checks, to cope with unintentional modification of input/output data to control systems and devices.

Use data recovery:

- Conduct periodical data backups and maintenance to prepare for potential data loss.

For more information see Omron’s advisory: OMSR-2022-002

This vulnerability and countermeasures correspond to the those reported in the CISA ICS Alert: APT Cyber Tools Targeting ICS/SCADA Devices.

See Also

https://www.ia.omron.com/product/vulnerability/OMSR-2022-002_en.pdf

https://jvn.jp/en/vu/JVNVU97050784/index.html

https://www.cisa.gov/news-events/ics-advisories/icsa-22-314-07

Plugin Details

Severity: High

ID: 501152

Version: 1.4

Type: remote

Family: Tenable.ot

Published: 5/22/2023

Updated: 3/4/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-33971

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:omron:nj101-1000_firmware, cpe:/o:omron:nj101-1020_firmware, cpe:/o:omron:nj101-9000_firmware, cpe:/o:omron:nj101-9020_firmware, cpe:/o:omron:nj301-1100_firmware, cpe:/o:omron:nj301-1200_firmware, cpe:/o:omron:nj501-1300_firmware, cpe:/o:omron:nj501-1320_firmware, cpe:/o:omron:nj501-1340_firmware, cpe:/o:omron:nj501-140_firmware, cpe:/o:omron:nj501-1420_firmware, cpe:/o:omron:nj501-1500_firmware, cpe:/o:omron:nj501-1520_firmware, cpe:/o:omron:nj501-4300_firmware, cpe:/o:omron:nj501-4310_firmware, cpe:/o:omron:nj501-4320_firmware, cpe:/o:omron:nj501-4400_firmware, cpe:/o:omron:nj501-4500_firmware, cpe:/o:omron:nj501-5300_firmware, cpe:/o:omron:nj501-r300_firmware, cpe:/o:omron:nj501-r320_firmware, cpe:/o:omron:nj501-r400_firmware, cpe:/o:omron:nj501-r420_firmware, cpe:/o:omron:nj501-r500_firmware, cpe:/o:omron:nj501-r520_firmware, cpe:/o:omron:nx102-1000_firmware, cpe:/o:omron:nx102-1020_firmware, cpe:/o:omron:nx102-1100_firmware, cpe:/o:omron:nx102-1120_firmware, cpe:/o:omron:nx102-1200_firmware, cpe:/o:omron:nx102-1220_firmware, cpe:/o:omron:nx102-9020_firmware, cpe:/o:omron:nx1p2-1040dt1_firmware, cpe:/o:omron:nx1p2-1040dt_firmware, cpe:/o:omron:nx1p2-1140dt1_firmware, cpe:/o:omron:nx1p2-1140dt_firmware, cpe:/o:omron:nx1p2-9024dt1_firmware, cpe:/o:omron:nx1p2-9024dt_firmware, cpe:/o:omron:nx1w-adb21_firmware, cpe:/o:omron:nx1w-cif01_firmware, cpe:/o:omron:nx1w-cif11_firmware, cpe:/o:omron:nx1w-cif12_firmware, cpe:/o:omron:nx1w-dab21v_firmware, cpe:/o:omron:nx1w-mab221_firmware, cpe:/o:omron:nx701-1600_firmware, cpe:/o:omron:nx701-1620_firmware, cpe:/o:omron:nx701-1700_firmware, cpe:/o:omron:nx701-1720_firmware, cpe:/o:omron:nx701-z600_firmware, cpe:/o:omron:nx701-z700_firmware

Required KB Items: Tenable.ot/Omron

Exploit Ease: No known exploits are available

Patch Publication Date: 7/4/2022

Vulnerability Publication Date: 7/4/2022

Reference Information

CVE: CVE-2022-33971

CWE: 294