{"api_version":"1","generated_at":"2026-05-07T02:45:01+00:00","cve":"CVE-2014-2369","urls":{"html":"https://cve.report/CVE-2014-2369","api":"https://cve.report/api/cve/CVE-2014-2369.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-2369","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-2369"},"summary":{"title":"Omron NS Series HMI Cross-Site Request Forgery","description":"Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.","state":"PUBLISHED","assigner":"icscert","published_at":"2014-07-24 14:55:07","updated_at":"2026-05-06 22:30:45"},"problem_types":["CWE-352","CWE-352 CWE-352"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6","severity":"","vector":"AV:N/AC:M/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"ics-cert@hq.dhs.gov","type":"Secondary","score":"4.6","severity":"","vector":"AV:N/AC:H/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P","baseScore":4.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"CVSS","score":"4.6","severity":"","vector":"AV:N/AC:H/Au:S/C:P/I:P/A:P","data":{"accessComplexity":"HIGH","accessVector":"NETWORK","authentication":"SINGLE","availabilityImpact":"PARTIAL","baseScore":4.6,"confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P","version":"2.0"}}],"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-203-01","name":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-203-01","refsource":"ics-cert@hq.dhs.gov","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://automation.omron.com/en/us/products/","name":"https://automation.omron.com/en/us/products/","refsource":"ics-cert@hq.dhs.gov","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01","name":"http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"Omron NS Series HMI Vulnerabilities | ICS-CERT","mime":"application/octet-stream","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-2369","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-2369","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Omron","product":"NS15","version":"affected 8.1xx 8.68x custom","platforms":[]},{"source":"CNA","vendor":"Omron","product":"NS12","version":"affected 8.1xx 8.68x custom","platforms":[]},{"source":"CNA","vendor":"Omron","product":"NS10","version":"affected 8.1xx 8.68x custom","platforms":[]},{"source":"CNA","vendor":"Omron","product":"NS8","version":"affected 8.1xx 8.68x custom","platforms":[]},{"source":"CNA","vendor":"Omron","product":"NS5","version":"affected 8.1xx 8.68x custom","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Omron Corporation has produced update, Version 8.69x for Japan and \nVersion 8.7x for other countries, that mitigates the identified \nvulnerabilities. The updates for the NS series of HMI terminals can be \ndownloaded at the following locations:\n\n\nNS15 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns15/default.html \n\nNS12 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns12/default.html \n\nNS10 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns10/default.html \n\nNS8 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns8/default.html \n\nNS5 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns5/default.html","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Joel Sevilleja Febrer of S2 Grupo","lang":"en"}],"nvd_cpes":[{"cve_year":"2014","cve_id":"2369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"omron","cpe5":"ns10_hmi_terminal","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"2369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"omron","cpe5":"ns12_hmi_terminal","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"2369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"omron","cpe5":"ns15_hmi_terminal","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"2369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"omron","cpe5":"ns5_hmi_terminal","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"2369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"omron","cpe5":"ns8_hmi_terminal","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"2369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"omron","cpe5":"ns_series_system_program_firmware","cpe6":"8.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"2369","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"omron","cpe5":"ns_series_system_program_firmware","cpe6":"8.68","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2014-2369","qid":"590466","title":"Omron NS Series HMI Multiple Vulnerabilities (ICSA-14-203-01)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T10:14:25.244Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01"}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"NS15","vendor":"Omron","versions":[{"lessThan":"8.68x","status":"affected","version":"8.1xx","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NS12","vendor":"Omron","versions":[{"lessThan":"8.68x","status":"affected","version":"8.1xx","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NS10","vendor":"Omron","versions":[{"lessThan":"8.68x","status":"affected","version":"8.1xx","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NS8","vendor":"Omron","versions":[{"lessThan":"8.68x","status":"affected","version":"8.1xx","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NS5","vendor":"Omron","versions":[{"lessThan":"8.68x","status":"affected","version":"8.1xx","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Joel Sevilleja Febrer of S2 Grupo"}],"datePublic":"2014-07-22T06:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.</p>"}],"value":"Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors."}],"metrics":[{"cvssV2_0":{"accessComplexity":"HIGH","accessVector":"NETWORK","authentication":"SINGLE","availabilityImpact":"PARTIAL","baseScore":4.6,"confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P","version":"2.0"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-06T17:59:20.171Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-203-01"},{"url":"https://automation.omron.com/en/us/products/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Omron Corporation has produced update, Version 8.69x for Japan and \nVersion 8.7x for other countries, that mitigates the identified \nvulnerabilities. The updates for the NS series of HMI terminals can be \ndownloaded at the following locations:</p>\n<p>NS15 Software Update Version 8.7:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns15/default.html\">http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns15/default.html</a></p><p>NS12 Software Update Version 8.7:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns12/default.html\">http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns12/default.html</a></p><p>NS10 Software Update Version 8.7:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns10/default.html\">http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns10/default.html</a></p><p>NS8 Software Update Version 8.7:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns8/default.html\">http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns8/default.html</a></p><p>NS5 Software Update Version 8.7:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns5/default.html\">http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns5/default.html</a></p>\n\n<br>"}],"value":"Omron Corporation has produced update, Version 8.69x for Japan and \nVersion 8.7x for other countries, that mitigates the identified \nvulnerabilities. The updates for the NS series of HMI terminals can be \ndownloaded at the following locations:\n\n\nNS15 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns15/default.html \n\nNS12 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns12/default.html \n\nNS10 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns10/default.html \n\nNS8 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns8/default.html \n\nNS5 Software Update Version 8.7:\n\n\n http://industrial.omron.us/en/products/catalogue/automation_systems/hmi/scalable_hmi/ns5/default.html"}],"source":{"advisory":"ICSA-14-203-01","discovery":"UNKNOWN"},"title":"Omron NS Series HMI Cross-Site Request Forgery","x_generator":{"engine":"Vulnogram 0.2.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2014-2369","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01","refsource":"MISC","url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01"}]}}}},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2014-2369","datePublished":"2014-07-24T14:00:00.000Z","dateReserved":"2014-03-13T00:00:00.000Z","dateUpdated":"2025-10-06T17:59:20.171Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2014-07-24 14:55:07","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["CWE-352","CWE-352 CWE-352"],"metrics":{"cvssMetricV2":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:P/I:P/A:P","baseScore":4.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:omron:ns_series_system_program_firmware:8.1:*:*:*:*:*:*:*","matchCriteriaId":"8246BB5A-986B-4AA0-B3A2-645976E8E7AF"},{"vulnerable":true,"criteria":"cpe:2.3:o:omron:ns_series_system_program_firmware:8.68:*:*:*:*:*:*:*","matchCriteriaId":"58C930D1-BA9F-4643-8321-B160A018C5D9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:omron:ns10_hmi_terminal:-:*:*:*:*:*:*:*","matchCriteriaId":"31B221BA-8C11-41E2-836A-3007022AB5DE"},{"vulnerable":true,"criteria":"cpe:2.3:h:omron:ns12_hmi_terminal:-:*:*:*:*:*:*:*","matchCriteriaId":"6E804153-AE32-4FE1-920F-FF648A2B2FE0"},{"vulnerable":true,"criteria":"cpe:2.3:h:omron:ns15_hmi_terminal:-:*:*:*:*:*:*:*","matchCriteriaId":"F78DF368-D063-42D2-ABD4-ABD63BF22842"},{"vulnerable":true,"criteria":"cpe:2.3:h:omron:ns5_hmi_terminal:-:*:*:*:*:*:*:*","matchCriteriaId":"076C5660-3EBF-4318-B3C6-BF28596EB99E"},{"vulnerable":true,"criteria":"cpe:2.3:h:omron:ns8_hmi_terminal:-:*:*:*:*:*:*:*","matchCriteriaId":"112E9FC7-96BB-4E5F-8697-8E0E48A80914"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"2369","Ordinal":"1","Title":"Omron NS Series HMI Cross-Site Request Forgery","CVE":"CVE-2014-2369","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"2369","Ordinal":"1","NoteData":"Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.","Type":"Description","Title":"Omron NS Series HMI Cross-Site Request Forgery"},{"CveYear":"2014","CveId":"2369","Ordinal":"2","NoteData":"2014-07-24","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"2369","Ordinal":"3","NoteData":"2014-07-24","Type":"Other","Title":"Modified"}]}}}