Omron NJ/NX-series Machine Automation Controllers
Omron NJ/NX-series Machine Automation Controllers and related software contain authentication bypass vulnerabilities in their communications protocol (CWE-798: Use of Hardcoded Credentials, CWE-294: Authentication Using a Shared Secret). An attacker with network access can bypass authentication mechanisms to gain unauthorized login and operational control of the affected controllers. This affects NX7-series, NX1-series, NJ-series controllers, Sysmac Studio automation software, and NA-series Programmable Terminals. The vulnerability has been linked to APT cyber tools targeting industrial control systems.
- Network access to the controller's communications port (e.g., port 9600 for FINS protocol)
- No valid credentials required
- Knowledge of target controller model and firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2c6c776f-df86-4275-b690-75abbc25e9ccGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.