Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU92193064/ | Third Party Advisory |
https://www.ia.omron.com/product/vulnerability/OMSR-2023-006_en.pdf | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2023-08-03T04:55:52.423Z
Updated: 2023-08-03T04:55:52.423Z
Reserved: 2023-07-25T03:05:55.191Z
Link: CVE-2023-38744
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-08-03T05:15:10.417
Modified: 2023-08-11T21:01:37.107
Link: CVE-2023-38744
JSON object: View
Redhat Information
No data.
CWE