Omron CX-One
CX-One and CX-Server contain a buffer overflow or memory corruption vulnerability (CWE-121) that allows arbitrary code execution if a user opens a specially crafted file or attachment on a machine running the software. The vulnerability requires local access and user interaction; it is not exploitable remotely. Successful exploitation could allow an attacker to run commands with the privileges of the application user, potentially leading to modification of PLC programs, control logic, or access to sensitive engineering data.
- Local access to a machine running CX-One version 4.60 or earlier, or CX-Server version 5.0.29.0 or earlier
- User interaction required: victim must open a malicious file or attachment
- No special credentials or elevated privileges needed before exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8970d106-d94e-4ce7-a68b-9dcb1ec27bfcGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.