First published: Tue Jul 31 2018(Updated: )
Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Fcj Firmware | <=r4.02 | |
Yokogawa Fcj | ||
Yokogawa Fcn-100 Firmware | <=r4.02 | |
Yokogawa Fcn-100 | ||
Yokogawa Fcn-rtu Firmware | <=r4.02 | |
Yokogawa Fcn-rtu | ||
Yokogawa Fcn-500 Firmware | <=r4.02 | |
Yokogawa Fcn-500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-10592 is critical with a CVSS score of 9.8.
Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior are affected by CVE-2018-10592.
CVE-2018-10592 allows an attacker to gain unauthorized administrative access to the affected devices, which could result in unauthorized control of the device.
To fix CVE-2018-10592, it is recommended to update the firmware of the affected Yokogawa devices to version R4.03 or later.
More information about CVE-2018-10592 can be found on the following references: [1] http://www.securityfocus.com/bid/104376, [2] https://ics-cert.us-cert.gov/advisories/ICSA-18-151-03, [3] https://web-material3.yokogawa.com/1/6712/details/YSAR-18-0004-E.pdf