First published: Tue Apr 17 2018(Updated: )
A weakness in access controls in CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, CENTUM CS 3000 Small versions R3.09.50 and earlier, CENTUM VP versions R6.03.10 and earlier, CENTUM VP Small versions R6.03.10 and earlier, CENTUM VP Basic versions R6.03.10 and earlier, Exaopc versions R3.75.00 and earlier, B/M9000 CS all versions, and B/M9000 VP versions R8.01.01 and earlier may allow a local attacker to exploit the message management function of the system. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa B\/m9000 Cs | ||
Yokogawa B\/m9000 Vp | <=r8.01.01 | |
Yokogawa CENTUM CS 3000 | <=r3.09.50 | |
Yokogawa CENTUM CS 3000 | <=r3.09.50 | |
Yokogawa Centum Vp | <=r6.03.10 | |
Yokogawa Centum Vp | <=r6.03.10 | |
Yokogawa Centum Vp | <=r6.03.10 | |
Yokogawa Exaopc | <=r3.75.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8838 is a vulnerability in access controls in CENTUM CS 1000 and CENTUM CS 3000.
CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, and other related versions are affected.
CVE-2018-8838 has a severity rating of 6.5 (Medium).
To fix the CVE-2018-8838 vulnerability, update to the latest version of the affected software or apply the necessary patches provided by Yokogawa.
You can find more information about CVE-2018-8838 at the following link: [https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01](https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01)