Skip to main content

CVE-2024-12083: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OMRON Corporation Machine Automation Controller NJ-series

Medium
VulnerabilityCVE-2024-12083cvecve-2024-12083cwe-22
Published: Tue Jan 14 2025 (01/14/2025, 00:46:33 UTC)
Source: CVE
Vendor/Project: OMRON Corporation
Product: Machine Automation Controller NJ-series

Description

Path Traversal Vulnerabilities (CWE-22) exist in NJ/NX-series Machine Automation Controllers. An attacker may use these vulnerabilities to perform unauthorized access and to execute unauthorized code remotely to the controller products.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:56:15 UTC

Technical Analysis

CVE-2024-12083 is a path traversal vulnerability (CWE-22) identified in OMRON Corporation's Machine Automation Controller NJ-series, specifically affecting versions NJ101-[][][][] Ver.1.64.05 and lower. Path traversal vulnerabilities occur when an application improperly restricts user-supplied input to file paths, allowing attackers to access files and directories outside the intended restricted directory. In this case, the vulnerability allows an attacker with certain privileges to perform unauthorized access and remotely execute unauthorized code on the affected controllers. The CVSS 3.1 base score is 6.6 (medium severity), with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), requiring privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This suggests that exploitation requires an attacker to have some level of authorized access or credentials but can be performed remotely without user interaction. The vulnerability could enable attackers to traverse directories beyond intended boundaries, potentially reading sensitive configuration files, injecting malicious code, or disrupting controller operations. These controllers are critical components in industrial automation environments, controlling machinery and processes, so exploitation could lead to operational disruptions or safety hazards. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor updates or configuration changes once available.

Potential Impact

For European organizations utilizing OMRON NJ-series Machine Automation Controllers, this vulnerability poses a significant risk to industrial control systems (ICS) and operational technology (OT) environments. Unauthorized access and remote code execution could lead to manipulation or disruption of automated manufacturing processes, causing production downtime, financial losses, and potential safety incidents. Confidentiality breaches could expose sensitive operational data or intellectual property. Integrity compromises could result in altered control commands, leading to defective products or unsafe conditions. Availability impacts could halt critical industrial operations. Given the reliance on automation in sectors such as automotive manufacturing, pharmaceuticals, and energy production across Europe, exploitation could have cascading effects on supply chains and critical infrastructure. The requirement for attacker privileges somewhat limits the attack surface but insider threats or compromised credentials could enable exploitation. The lack of known exploits suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should immediately inventory their use of OMRON NJ-series controllers and identify affected versions (Ver.1.64.05 and lower). Until patches are released, implement strict network segmentation to isolate these controllers from general IT networks and limit access to trusted personnel only. Enforce strong authentication and credential management policies to reduce the risk of privilege escalation or credential compromise. Monitor network traffic and controller logs for unusual access patterns or attempts to access unauthorized directories. Employ application-layer firewalls or intrusion detection systems tailored for ICS environments to detect and block suspicious path traversal attempts. Engage with OMRON for timely updates and apply patches as soon as they become available. Additionally, conduct security awareness training for staff managing these controllers to recognize and report potential security incidents. Consider deploying compensating controls such as read-only file system permissions where feasible to limit unauthorized code execution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
OMRON
Date Reserved
2024-12-03T04:43:25.034Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9d53

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:56:15 PM

Last updated: 8/11/2025, 2:55:25 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats