First published: Fri Mar 11 2022(Updated: )
The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial configuration: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Centum Vp Firmware | >=r5.01.00<=r5.04.20 | |
Yokogawa Centum Vp Firmware | >=r6.01.00<r6.09.00 | |
Yokogawa Centum Vp | ||
Yokogawa Centum Vp Entry Firmware | >=r4.01.00<=r4.03.00 | |
Yokogawa Centum Vp Entry Firmware | >=r5.01.00<=r5.04.20 | |
Yokogawa Centum Vp Entry Firmware | >=r6.01.00<r6.09.00 | |
Yokogawa Centum Vp Entry | ||
Yokogawa Exaopc | >=r3.72.00<r3.80.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-21194.
The following Yokogawa Electric products are affected: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00.
The severity of CVE-2022-21194 is critical with a CVSS score of 9.8.
CVE-2022-21194 affects Yokogawa Centum VP firmware versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0.
To fix CVE-2022-21194, Yokogawa Electric recommends updating to the latest firmware versions: CENTUM VP R5.04.21 or later, CENTUM VP R6.08.1 or later, Exaopc R3.80.01 or later.