Omron CX-Supervisor (Update A)
CX-Supervisor versions 3.40 and earlier contain multiple memory corruption vulnerabilities (buffer overflow, use-after-free, out-of-bounds write) in its process memory handling. These are tracked as CWE-121, CWE-416, CWE-824, CWE-415, CWE-787, CWE-822, and CWE-122. Successful exploitation could allow remote code execution on systems running vulnerable versions. Omron has released version 3.4.1 to address these issues. The advisory notes that these vulnerabilities are not exploitable remotely without authentication, and no public exploits are currently known.
- Network access to the CX-Supervisor workstation (port varies by configuration, typically internal network)
- Valid engineering workstation credentials or ability to authenticate to CX-Supervisor
- CX-Supervisor version 3.40 or earlier running on target system
- User interaction or ability to reach the vulnerable code path in the application
Patching may require device reboot — plan for process interruption
/api/v1/advisories/446616e5-7a5d-4048-9da2-9872bb704ce5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.