Vulnerabilites related to Omron - Sysmac Studio
CVE-2022-45793 (GCVE-0-2022-45793)
Vulnerability from cvelistv5
Published
2024-01-10 20:49
Modified
2025-04-17 15:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
Sysmac Studio installs executables in a directory with poor permissions. This can allow a locally-authenticated attacker to overwrite files which will result in code execution with privileges of a different user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | Sysmac Studio |
Version: 0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:04.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-04" }, { "tags": [ "x_transferred" ], "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" }, { "tags": [ "x_transferred" ], "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-009_en.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45793", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-11T19:43:03.624295Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T15:42:42.580Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Windows", "64 bit", "32 bit" ], "product": "Sysmac Studio", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "1.54.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Reid Wightman of Dragos" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sysmac Studio installs executables in a directory with poor permissions. This can allow a locally-authenticated attacker to overwrite files which will result in code execution with privileges of a different user." } ], "value": "Sysmac Studio installs executables in a directory with poor permissions. This can allow a locally-authenticated attacker to overwrite files which will result in code execution with privileges of a different user." } ], "impacts": [ { "capecId": "CAPEC-558", "descriptions": [ { "lang": "en", "value": "CAPEC-558 Replace Trusted Executable" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-22T16:32:24.144Z", "orgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "shortName": "Dragos" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-262-04" }, { "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" }, { "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-009_en.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Executable files writable by low-privileged users in Omron Sysmac Studio", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "assignerShortName": "Dragos", "cveId": "CVE-2022-45793", "datePublished": "2024-01-10T20:49:36.082Z", "dateReserved": "2022-11-22T17:52:43.199Z", "dateUpdated": "2025-04-17T15:42:42.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-45792 (GCVE-0-2022-45792)
Vulnerability from cvelistv5
Published
2024-01-22 17:46
Modified
2025-06-17 21:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Project files may contain malicious contents which the software will use to create files on the filesystem. This allows directory traversal and overwriting files with the privileges of the logged-in user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | Sysmac Studio |
Version: 0 < 1.54.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:17:04.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-45792", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-30T18:36:27.204028Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T21:19:25.577Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "x86", "64 bit" ], "product": "Sysmac Studio", "vendor": "Omron", "versions": [ { "lessThan": "1.54.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Project files may contain malicious contents which the software will use to create files on the filesystem. This allows directory traversal and overwriting files with the privileges of the logged-in user." } ], "value": "Project files may contain malicious contents which the software will use to create files on the filesystem. This allows directory traversal and overwriting files with the privileges of the logged-in user." } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-22T17:46:36.699Z", "orgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "shortName": "Dragos" }, "references": [ { "url": "https://www.dragos.com/advisory/omron-plc-and-engineering-software-network-and-file-format-access/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Directory Traversal in Project File Format allows overwrite (Zip Slip)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "12bdf821-1545-4a87-aac5-61670cc6fcef", "assignerShortName": "Dragos", "cveId": "CVE-2022-45792", "datePublished": "2024-01-22T17:46:36.699Z", "dateReserved": "2022-11-22T17:52:43.198Z", "dateUpdated": "2025-06-17T21:19:25.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }