First published: Fri Apr 15 2022(Updated: )
OS command injection vulnerability exists in CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02, which may allow an attacker who can access the computer where the affected product is installed to execute an arbitrary OS command by altering a file generated using Graphic Builder.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa B\/m9000 Vp | >=r6.01.01<=r6.03.02 | |
Yokogawa Centum Vp | >=r4.01.00<=r4.03.00 | |
Yokogawa Centum Vp | >=r4.01.00<=r4.03.00 | |
Yokogawa Centum Vp | >=r4.01.00<=r4.03.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-27188 is high with a CVSS score of 7.8.
CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02 are affected by CVE-2022-27188.
CVE-2022-27188 is an OS command injection vulnerability.
An attacker who can access the computer where the affected product is installed can execute arbitrary OS commands through CVE-2022-27188.
You can find more information about CVE-2022-27188 in the following references: [JVN Vulnerability Information](https://jvn.jp/vu/JVNVU99204686/index.html) and [Yokogawa Security Advisory Report](https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/).