First published: Fri Oct 12 2018(Updated: )
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify information. This attack can be executed only during maintenance work.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Fcj Firmware | <=r4.10 | |
Yokogawa Fcj | ||
Yokogawa Fcn-100 Firmware | <=r4.10 | |
Yokogawa Fcn-100 | ||
Yokogawa Fcn-rtu Firmware | <=r4.10 | |
Yokogawa Fcn-rtu | ||
Yokogawa Fcn-500 Firmware | <=r4.10 | |
Yokogawa Fcn-500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17896 is a vulnerability in Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, and FCN-500, versions R4.10 and prior, that allows attackers to gain unauthorized access using hard-coded credentials.
CVE-2018-17896 has a severity level of 8.1 (critical).
An attacker can exploit CVE-2018-17896 by using the hard-coded credentials to gain unauthorized access to the maintenance functions and obtain or modify information.
Yes, all versions of Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, and FCN-500 up to version R4.10 are vulnerable to CVE-2018-17896.
To fix CVE-2018-17896, it is recommended to apply the necessary security patches or firmware updates provided by Yokogawa.