First published: Thu Dec 26 2019(Updated: )
An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Exaopc | >=r1.01.00<=r3.77.00 | |
Yokogawa Exaplog | >=r1.10.00<=r3.30.00 | |
Yokogawa Exaquantum | >=r1.10.00<=r3.02.00 | |
Yokogawa Exaquantum\/batch | >=r1.01.00<=r2.50.40 | |
Yokogawa Exarqe | ||
Yokogawa Exasmoc | ||
Yokogawa Ga10 | >=r1.01.01<=r3.05.01 | |
Yokogawa Insightsuiteae | >=r1.01.00<=r1.06.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6008 is an unquoted search path vulnerability in Multiple Yokogawa products for Windows.
The Yokogawa products affected by CVE-2019-6008 include Exaopc, Exaplog, Exaquantum, Exaquantum/Batch, Exasmoc, Exarqe, GA10, and Insightsuiteae.
CVE-2019-6008 has a severity rating of 7.8 (high).
To fix CVE-2019-6008, it is recommended to apply the necessary security patches provided by Yokogawa.
You can find more information about CVE-2019-6008 on the official Yokogawa security advisory report and the JVN vulnerability database.