CVE-2024-12083: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OMRON Corporation Machine Automation Controller NJ-series
Path Traversal Vulnerabilities (CWE-22) exist in NJ/NX-series Machine Automation Controllers. An attacker may use these vulnerabilities to perform unauthorized access and to execute unauthorized code remotely to the controller products.
AI Analysis
Technical Summary
CVE-2024-12083 is a path traversal vulnerability (CWE-22) identified in OMRON Corporation's Machine Automation Controller NJ-series, specifically affecting versions NJ101-[][][][] Ver.1.64.05 and lower. Path traversal vulnerabilities occur when an application improperly restricts user-supplied input to file paths, allowing attackers to access files and directories outside the intended restricted directory. In this case, the vulnerability allows an attacker with certain privileges to perform unauthorized access and remotely execute unauthorized code on the affected controllers. The CVSS 3.1 base score is 6.6 (medium severity), with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), requiring privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This suggests that exploitation requires an attacker to have some level of authorized access or credentials but can be performed remotely without user interaction. The vulnerability could enable attackers to traverse directories beyond intended boundaries, potentially reading sensitive configuration files, injecting malicious code, or disrupting controller operations. These controllers are critical components in industrial automation environments, controlling machinery and processes, so exploitation could lead to operational disruptions or safety hazards. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor updates or configuration changes once available.
Potential Impact
For European organizations utilizing OMRON NJ-series Machine Automation Controllers, this vulnerability poses a significant risk to industrial control systems (ICS) and operational technology (OT) environments. Unauthorized access and remote code execution could lead to manipulation or disruption of automated manufacturing processes, causing production downtime, financial losses, and potential safety incidents. Confidentiality breaches could expose sensitive operational data or intellectual property. Integrity compromises could result in altered control commands, leading to defective products or unsafe conditions. Availability impacts could halt critical industrial operations. Given the reliance on automation in sectors such as automotive manufacturing, pharmaceuticals, and energy production across Europe, exploitation could have cascading effects on supply chains and critical infrastructure. The requirement for attacker privileges somewhat limits the attack surface but insider threats or compromised credentials could enable exploitation. The lack of known exploits suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately inventory their use of OMRON NJ-series controllers and identify affected versions (Ver.1.64.05 and lower). Until patches are released, implement strict network segmentation to isolate these controllers from general IT networks and limit access to trusted personnel only. Enforce strong authentication and credential management policies to reduce the risk of privilege escalation or credential compromise. Monitor network traffic and controller logs for unusual access patterns or attempts to access unauthorized directories. Employ application-layer firewalls or intrusion detection systems tailored for ICS environments to detect and block suspicious path traversal attempts. Engage with OMRON for timely updates and apply patches as soon as they become available. Additionally, conduct security awareness training for staff managing these controllers to recognize and report potential security incidents. Consider deploying compensating controls such as read-only file system permissions where feasible to limit unauthorized code execution.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Poland, Czech Republic, Sweden
CVE-2024-12083: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OMRON Corporation Machine Automation Controller NJ-series
Description
Path Traversal Vulnerabilities (CWE-22) exist in NJ/NX-series Machine Automation Controllers. An attacker may use these vulnerabilities to perform unauthorized access and to execute unauthorized code remotely to the controller products.
AI-Powered Analysis
Technical Analysis
CVE-2024-12083 is a path traversal vulnerability (CWE-22) identified in OMRON Corporation's Machine Automation Controller NJ-series, specifically affecting versions NJ101-[][][][] Ver.1.64.05 and lower. Path traversal vulnerabilities occur when an application improperly restricts user-supplied input to file paths, allowing attackers to access files and directories outside the intended restricted directory. In this case, the vulnerability allows an attacker with certain privileges to perform unauthorized access and remotely execute unauthorized code on the affected controllers. The CVSS 3.1 base score is 6.6 (medium severity), with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), requiring privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This suggests that exploitation requires an attacker to have some level of authorized access or credentials but can be performed remotely without user interaction. The vulnerability could enable attackers to traverse directories beyond intended boundaries, potentially reading sensitive configuration files, injecting malicious code, or disrupting controller operations. These controllers are critical components in industrial automation environments, controlling machinery and processes, so exploitation could lead to operational disruptions or safety hazards. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor updates or configuration changes once available.
Potential Impact
For European organizations utilizing OMRON NJ-series Machine Automation Controllers, this vulnerability poses a significant risk to industrial control systems (ICS) and operational technology (OT) environments. Unauthorized access and remote code execution could lead to manipulation or disruption of automated manufacturing processes, causing production downtime, financial losses, and potential safety incidents. Confidentiality breaches could expose sensitive operational data or intellectual property. Integrity compromises could result in altered control commands, leading to defective products or unsafe conditions. Availability impacts could halt critical industrial operations. Given the reliance on automation in sectors such as automotive manufacturing, pharmaceuticals, and energy production across Europe, exploitation could have cascading effects on supply chains and critical infrastructure. The requirement for attacker privileges somewhat limits the attack surface but insider threats or compromised credentials could enable exploitation. The lack of known exploits suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
European organizations should immediately inventory their use of OMRON NJ-series controllers and identify affected versions (Ver.1.64.05 and lower). Until patches are released, implement strict network segmentation to isolate these controllers from general IT networks and limit access to trusted personnel only. Enforce strong authentication and credential management policies to reduce the risk of privilege escalation or credential compromise. Monitor network traffic and controller logs for unusual access patterns or attempts to access unauthorized directories. Employ application-layer firewalls or intrusion detection systems tailored for ICS environments to detect and block suspicious path traversal attempts. Engage with OMRON for timely updates and apply patches as soon as they become available. Additionally, conduct security awareness training for staff managing these controllers to recognize and report potential security incidents. Consider deploying compensating controls such as read-only file system permissions where feasible to limit unauthorized code execution.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- OMRON
- Date Reserved
- 2024-12-03T04:43:25.034Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9d53
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 3:56:15 PM
Last updated: 8/11/2025, 2:55:25 AM
Views: 11
Related Threats
CVE-2025-8844: NULL Pointer Dereference in NASM Netwide Assember
MediumCVE-2025-8843: Heap-based Buffer Overflow in NASM Netwide Assember
MediumCVE-2025-8842: Use After Free in NASM Netwide Assember
MediumCVE-2025-8841: Unrestricted Upload in zlt2000 microservices-platform
MediumCVE-2025-8840: Improper Authorization in jshERP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.