Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

OMRON — Vulnerabilities & Security Advisories 25

Browse all 25 CVE security advisories affecting OMRON. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Omron operates primarily as a manufacturer of industrial automation components, including programmable logic controllers, sensors, and safety devices, which are critical for manufacturing infrastructure. The company’s product portfolio, particularly its networked industrial controllers and human-machine interfaces, has historically been associated with several common vulnerability classes. Recorded Common Vulnerabilities and Exposures (CVEs) frequently involve remote code execution, buffer overflows, and improper access control mechanisms that can lead to privilege escalation. These flaws often stem from legacy protocols or insufficient input validation in embedded systems. While no single catastrophic public breach has defined the company’s recent history, the accumulation of 25 CVEs highlights ongoing challenges in securing connected industrial equipment. Security researchers emphasize the need for rigorous patch management and network segmentation to mitigate risks associated with these persistent software defects in Omron’s automation solutions.

CVE IDTitleCVSSSeverityPublished
CVE-2022-45792 Directory Traversal in Project File Format allows overwrite (Zip Slip) — Sysmac StudioCWE-22 7.8 High2024-01-22
CVE-2022-45790 Omron FINS memory protection susceptible to bruteforce — CJ-series and CS-series CPU modulesCWE-307 8.6 High2024-01-22
CVE-2022-45794 Omron CJ-series and CS-series unauthenticated filesystem access. — CJ-series and CS-series CPU modulesCWE-306 8.6 High2024-01-10
CVE-2022-45793 Executable files writable by low-privileged users in Omron Sysmac Studio — Sysmac StudioCWE-276 5.5 Medium2024-01-10
CVE-2022-3396 OMRON CX-Programmer Out-of-bounds Write — CX-ProgrammerCWE-787 7.8 High2022-10-06
CVE-2022-3398 OMRON CX-Programmer Out-of-bounds Write — CX-ProgrammerCWE-787 7.8 High2022-10-06
CVE-2022-3397 OMRON CX-Programmer Out-of-bounds Write — CX-ProgrammerCWE-787 7.8 High2022-10-06
CVE-2022-2979 Omron CX-Programmer — CX-ProgrammerCWE-416 7.8 High2022-09-12
CVE-2022-26419 Rockwell Automation Studio 5000 Logix Designer Code Injection — CX-PositionCWE-121 7.8 High2022-04-01
CVE-2022-26022 Rockwell Automation Studio 5000 Logix Designer Out-of-Bounds Write — CX-PositionCWE-787 7.8 High2022-04-01
CVE-2022-26417 Rockwell Automation Studio 5000 Logix Designer Use After Free — CX-PositionCWE-416 7.8 High2022-04-01
CVE-2022-25959 Rockwell Automation Studio 5000 Logix Designer Improper Restriction of Operations within the Bounds of a Memory Buffer — CX-PositionCWE-119 7.8 High2022-04-01
CVE-2022-21137 Omron CX-One — CX-OneCWE-121 7.8 High2022-01-14
CVE-2020-27257 Omron CX-One — CX-OneCWE-843 7.8 -2021-02-09
CVE-2020-27261 Omron CX-One — CX-OneCWE-121 7.8 -2021-02-09
CVE-2020-27259 Omron CX-One — CX-OneCWE-822 8.8 -2021-02-09
CVE-2019-18269 Omron PLC CJ series安全漏洞 — Omron PLC CJ SeriesCWE-412 9.8 -2019-12-16
CVE-2019-6556 Omron CX-Programmer和Omron Common Components 资源管理错误漏洞 — CX-Programmer within CX-OneCWE-416 7.3 -2019-04-10
CVE-2018-19027 Omron CX-One CX-Protocol 安全漏洞 — CX-Protocol within CX-OneCWE-843 7.8 -2019-01-30
CVE-2018-17913 Omron CX-Supervisor 安全漏洞 — CX-SupervisorCWE-704 7.3 -2018-11-05
CVE-2018-17909 Omron CX-Supervisor 安全漏洞 — CX-SupervisorCWE-416 6.6 -2018-11-05
CVE-2018-17907 Omron CX-Supervisor 缓冲区错误漏洞 — CX-SupervisorCWE-119 3.3 -2018-11-05
CVE-2018-17905 Omron CX-Supervisor 缓冲区错误漏洞 — CX-SupervisorCWE-119 7.1 -2018-11-05
CVE-2014-2369 Omron NS Series HMI Cross-Site Request Forgery — NS15CWE-352 8.0 -2014-07-24
CVE-2014-2370 Omron NS Series HMI Improper Neutralization of Input During Web Page Generation — NS15CWE-79 5.4 -2014-07-24

This page lists every published CVE security advisory associated with OMRON. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.