Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:omron:ns_series_system_program_firmware:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8246BB5A-986B-4AA0-B3A2-645976E8E7AF", "vulnerable": true}, {"criteria": "cpe:2.3:o:omron:ns_series_system_program_firmware:8.68:*:*:*:*:*:*:*", "matchCriteriaId": "58C930D1-BA9F-4643-8321-B160A018C5D9", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:omron:ns10_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "31B221BA-8C11-41E2-836A-3007022AB5DE", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns12_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E804153-AE32-4FE1-920F-FF648A2B2FE0", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns15_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F78DF368-D063-42D2-ABD4-ABD63BF22842", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns5_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "076C5660-3EBF-4318-B3C6-BF28596EB99E", "vulnerable": true}, {"criteria": "cpe:2.3:h:omron:ns8_hmi_terminal:-:*:*:*:*:*:*:*", "matchCriteriaId": "112E9FC7-96BB-4E5F-8697-8E0E48A80914", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors."}, {"lang": "es", "value": "Vulnerabilidad de CSRF en la aplicaci\u00f3n web en los terminales HMI Omron NS5, NS8, NS10, NS12 y NS15 8.1xx hasta 8.68x permite a usuarios remotos autenticados secuestrar la autenticaci\u00f3n de victimas no especificadas a trav\u00e9s de vectores desconocidos."}], "id": "CVE-2014-2369", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-07-24T14:55:07.287", "references": [{"source": "ics-cert@hq.dhs.gov", "tags": ["Third Party Advisory", "US Government Resource"], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "US Government Resource"], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-203-01"}], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}