First published: Fri Apr 15 2022(Updated: )
Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa B\/m9000 Vp | >=r8.01.01<=r8.03.01 | |
Yokogawa Centum Vp | >=r6.01.10<=r6.09.00 | |
Yokogawa Centum Vp | >=r6.01.10<=r06.09.00 | |
Yokogawa Centum Vp | >=r6.01.10<=r6.09.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26034 is an improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01.
CVE-2022-26034 has a severity rating of 9.1 (Critical).
CVE-2022-26034 affects Yokogawa B/M9000 VP (R8.01.01 to R8.03.01) and Yokogawa CENTUM VP (R6.01.10 to R6.09.00) including CENTUM VP Small and CENTUM VP Basic.
To fix CVE-2022-26034, it is recommended to apply the patches or updates provided by Yokogawa.
More information about CVE-2022-26034 can be found on the JVN and Yokogawa websites.