CVE-2025-1384
📋 TL;DR
A least privilege violation vulnerability in Omron NJ/NX-series Machine Automation Controllers allows attackers to bypass intended access restrictions. This enables unauthorized remote code execution on industrial control systems. Organizations using affected Omron controllers with Sysmac Studio software are at risk.
💻 Affected Systems
- Omron NJ-series Machine Automation Controllers
- Omron NX-series Machine Automation Controllers
- Sysmac Studio Software
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of industrial control systems leading to production disruption, equipment damage, or safety incidents through unauthorized remote code execution.
Likely Case
Unauthorized access to controller functions allowing manipulation of industrial processes, data theft, or denial of service attacks.
If Mitigated
Limited impact if controllers are isolated in segmented networks with strict access controls and monitoring.
🎯 Exploit Status
Vulnerability allows unauthorized access without authentication, but requires network access to controller communication ports.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to vendor advisory OMSR-2025-004 for specific patched versions
Vendor Advisory: https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2025-004_en.pdf
Restart Required: Yes
Instructions:
1. Download latest firmware from Omron support portal. 2. Backup current configuration. 3. Apply firmware update via Sysmac Studio. 4. Restart controller. 5. Verify update and restore configuration.
🔧 Temporary Workarounds
Network Segmentation
allIsolate controllers in separate network segments with strict firewall rules
Access Control Lists
allImplement IP-based access restrictions to controller communication ports
🧯 If You Can't Patch
- Implement strict network segmentation to isolate controllers from untrusted networks
- Deploy industrial firewalls with deep packet inspection for controller communication protocols
🔍 How to Verify
Check if Vulnerable:
Check controller firmware version against patched versions listed in OMSR-2025-004 advisory
Check Version:
Use Sysmac Studio to connect to controller and check firmware version in device properties
Verify Fix Applied:
Verify firmware version matches or exceeds patched version specified in vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unauthorized connection attempts to controller ports
- Unexpected firmware or configuration changes
- Abnormal communication patterns from Sysmac Studio
Network Indicators:
- Unusual traffic to controller communication ports (typically TCP 9600+)
- Connection attempts from unauthorized IP addresses
- Protocol anomalies in controller communication
SIEM Query:
source_ip NOT IN (authorized_ips) AND destination_port IN (9600, 9601, 9602) AND protocol=tcp