First published: Tue Jun 28 2022(Updated: )
Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Stardom Fcj Firmware | >=r1.01<=r4.31 | |
Yokogawa Stardom Fcj | ||
Yokogawa Stardom Fcn Firmware | >=r1.01<=r4.31 | |
Yokogawa Stardom Fcn | ||
Yokogawa STARDOM FCN/FCJ: Versions R1.01 through R4.31 | ||
Yokogawa STARDOM FCN/FCJ: Versions R4.10 through R4.31, dual CPU modules only; only affected by CVE-2022-30997 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29519 is a vulnerability that allows an adjacent attacker to login to STARDOM FCN Controller and FCJ Controller R1.01 to R4.31 and alter device configuration settings or tamper with device firmware by exploiting the cleartext transmission of sensitive information.
CVE-2022-29519 can be exploited by an adjacent attacker to login to the affected products and modify device configurations or tamper with device firmware.
CVE-2022-29519 has a severity rating of 7.5 (high).
You may be affected by CVE-2022-29519 if you are using STARDOM FCN Controller and FCJ Controller versions R1.01 to R4.31.
Yes, Yokogawa Stardom Fcn and Fcj are affected by CVE-2022-29519 if they are running the vulnerable firmware versions R1.01 to R4.31.