CVE-2020-6986

7.5 HIGH

📋 TL;DR

CVE-2020-6986 is a denial-of-service vulnerability in Omron PLC CJ Series where an attacker can send specific data packets to cause a service error on the PLC Ethernet module, resulting in PLC service denial. This affects all versions of Omron PLC CJ Series with Ethernet modules, primarily impacting industrial control systems in manufacturing, energy, and critical infrastructure sectors.

💻 Affected Systems

Products:
  • Omron PLC CJ Series with Ethernet modules
Versions: All versions
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Ethernet modules enabled and accessible via network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete PLC service denial leading to production stoppage, equipment damage, or safety system failures in industrial environments.

🟠

Likely Case

Temporary PLC unavailability causing production interruptions until manual reset or system restart.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring allowing quick detection and response.

🌐 Internet-Facing: HIGH - Directly accessible PLCs can be easily targeted from the internet.
🏢 Internal Only: MEDIUM - Requires network access but could be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific data packets but no authentication needed. Likely weaponized in ICS-targeting toolkits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.us-cert.gov/ics/advisories/icsa-20-063-03

Restart Required: No

Instructions:

No official patch available. Follow workarounds and mitigation strategies from ICS-CERT advisory.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs in separate network segments with firewall rules restricting access.

Access Control Lists

all

Implement strict ACLs allowing only authorized IP addresses to communicate with PLCs.

🧯 If You Can't Patch

  • Implement network monitoring for abnormal packet patterns targeting PLCs
  • Deploy intrusion detection systems with ICS-specific signatures

🔍 How to Verify

Check if Vulnerable:

Check if Omron PLC CJ Series with Ethernet module is accessible on network and running any version.

Check Version:

Check PLC firmware version via Omron CX-Programmer software or PLC web interface.

Verify Fix Applied:

Verify network segmentation and access controls prevent unauthorized access to PLC network segments.

📡 Detection & Monitoring

Log Indicators:

  • PLC service error logs
  • Ethernet module restart events
  • Unusual packet rate to PLC ports

Network Indicators:

  • High volume of specific data packets to PLC Ethernet ports (typically TCP/UDP)
  • Connection attempts from unauthorized IPs

SIEM Query:

source_ip=* AND dest_port=* AND (protocol=TCP OR protocol=UDP) AND packet_count>threshold AND dest_ip=PLC_subnet

🔗 References

📤 Share & Export