ID

VAR-202003-1609


CVE

CVE-2020-6986


TITLE

Made by OMRON PLC CJ Service operation interruption in the series (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-002164

DESCRIPTION

In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets within a short period, causing a service error on the PLC Ethernet module, which in turn causes a PLC service denied result. Omron PLC CJ series is the PLC of Omron. Omron PLC CJ Series has an uncontrolled resource consumption vulnerability

Trust: 2.34

sources: NVD: CVE-2020-6986 // JVNDB: JVNDB-2020-002164 // CNVD: CNVD-2020-15516 // IVD: f6e446e7-4c03-4092-8422-03295fd2d029

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: f6e446e7-4c03-4092-8422-03295fd2d029 // CNVD: CNVD-2020-15516

AFFECTED PRODUCTS

vendor:omronmodel:plc cj1scope:eqversion:*

Trust: 1.0

vendor:omronmodel:plc cj2scope:eqversion:*

Trust: 1.0

vendor:omronmodel:plc cjscope:eqversion:シリーズの全て

Trust: 0.8

vendor:omronmodel:plc cj seriesscope: - version: -

Trust: 0.6

vendor:omronmodel:plc cj1scope:eqversion: -

Trust: 0.6

vendor:omronmodel:plc cj2scope: - version: -

Trust: 0.6

vendor:omronmodel:plc cj1scope: - version: -

Trust: 0.6

vendor:omronmodel:plc cj2scope:eqversion: -

Trust: 0.6

vendor:plc cj1model: - scope:eqversion:*

Trust: 0.2

vendor:plc cj2model: - scope:eqversion:*

Trust: 0.2

sources: IVD: f6e446e7-4c03-4092-8422-03295fd2d029 // CNVD: CNVD-2020-15516 // JVNDB: JVNDB-2020-002164 // CNNVD: CNNVD-202003-150 // NVD: CVE-2020-6986

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6986
value: HIGH

Trust: 1.0

JPCERT/CC: JVNDB-2020-002164
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-15516
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202003-150
value: HIGH

Trust: 0.6

IVD: f6e446e7-4c03-4092-8422-03295fd2d029
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2020-6986
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

JPCERT/CC: JVNDB-2020-002164
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-15516
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: f6e446e7-4c03-4092-8422-03295fd2d029
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2020-6986
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

JPCERT/CC: JVNDB-2020-002164
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: f6e446e7-4c03-4092-8422-03295fd2d029 // CNVD: CNVD-2020-15516 // JVNDB: JVNDB-2020-002164 // CNNVD: CNNVD-202003-150 // NVD: CVE-2020-6986

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

sources: NVD: CVE-2020-6986

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202003-150

TYPE

Resource management error

Trust: 0.8

sources: IVD: f6e446e7-4c03-4092-8422-03295fd2d029 // CNNVD: CNNVD-202003-150

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002164

PATCH

title:弊社PLC(CJシリーズCPU)に対する外部機関からの脆弱性指摘についてurl:http://www.omron-cxone.com/security/2020-02-28_PLC_JP.pdf

Trust: 0.8

sources: JVNDB: JVNDB-2020-002164

EXTERNAL IDS

db:NVDid:CVE-2020-6986

Trust: 3.2

db:ICS CERTid:ICSA-20-063-03

Trust: 3.0

db:CNVDid:CNVD-2020-15516

Trust: 0.8

db:CNNVDid:CNNVD-202003-150

Trust: 0.8

db:JVNid:JVNVU91000130

Trust: 0.8

db:JVNDBid:JVNDB-2020-002164

Trust: 0.8

db:AUSCERTid:ESB-2020.0779

Trust: 0.6

db:NSFOCUSid:46077

Trust: 0.6

db:IVDid:F6E446E7-4C03-4092-8422-03295FD2D029

Trust: 0.2

sources: IVD: f6e446e7-4c03-4092-8422-03295fd2d029 // CNVD: CNVD-2020-15516 // JVNDB: JVNDB-2020-002164 // CNNVD: CNNVD-202003-150 // NVD: CVE-2020-6986

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-20-063-03

Trust: 3.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-6986

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91000130/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-6986

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0779/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/46077

Trust: 0.6

sources: CNVD: CNVD-2020-15516 // JVNDB: JVNDB-2020-002164 // CNNVD: CNNVD-202003-150 // NVD: CVE-2020-6986

SOURCES

db:IVDid:f6e446e7-4c03-4092-8422-03295fd2d029
db:CNVDid:CNVD-2020-15516
db:JVNDBid:JVNDB-2020-002164
db:CNNVDid:CNNVD-202003-150
db:NVDid:CVE-2020-6986

LAST UPDATE DATE

2024-11-23T20:01:18.187000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-15516date:2020-03-05T00:00:00
db:JVNDBid:JVNDB-2020-002164date:2020-03-05T00:00:00
db:CNNVDid:CNNVD-202003-150date:2020-03-13T00:00:00
db:NVDid:CVE-2020-6986date:2024-11-21T05:36:26.310

SOURCES RELEASE DATE

db:IVDid:f6e446e7-4c03-4092-8422-03295fd2d029date:2020-03-03T00:00:00
db:CNVDid:CNVD-2020-15516date:2020-03-05T00:00:00
db:JVNDBid:JVNDB-2020-002164date:2020-03-05T00:00:00
db:CNNVDid:CNNVD-202003-150date:2020-03-03T00:00:00
db:NVDid:CVE-2020-6986date:2020-03-05T21:15:10.673