First published: Fri Mar 11 2022(Updated: )
The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Centum Vp Firmware | >=r5.01.00<=r5.04.20 | |
Yokogawa Centum Vp Firmware | >=r6.01.00<r6.09.00 | |
Yokogawa Centum Vp | ||
Yokogawa Centum Vp Entry Firmware | >=r5.01.00<=r5.04.20 | |
Yokogawa Centum Vp Entry Firmware | >=r6.01.00<r6.09.00 | |
Yokogawa Centum Vp Entry | ||
Yokogawa Exaopc | >=r3.72.00<r3.80.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
The severity of CVE-2022-23402 is critical with a CVSS score of 9.8.
The CWE-ID of CVE-2022-23402 is 798.
To fix CVE-2022-23402, Yokogawa Electric recommends updating to CENTUM VP versions R5.04.21 or later, or R6.09.01 or later, and Exaopc versions R3.80.00 or later.
More information about CVE-2022-23402 can be found in the Yokogawa Security Advisory Report YSAR-22-0001-E, available at https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf