First published: Tue Jun 28 2022(Updated: )
Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa STARDOM FCN/FCJ | ||
Yokogawa STARDOM FCN/FCJ | ||
All of | ||
Yokogawa Stardom Fcj Firmware | >=r4.10<=r4.31 | |
Yokogawa STARDOM FCN/FCJ | ||
All of | ||
Yokogawa Stardom Fcn Firmware | >=r4.10<=r4.31 | |
Yokogawa STARDOM FCN/FCJ | ||
Yokogawa Stardom Fcj Firmware | >=r4.10<=r4.31 | |
Yokogawa STARDOM FCN/FCJ | ||
Yokogawa Stardom Fcn Firmware | >=r4.10<=r4.31 | |
Yokogawa STARDOM FCN/FCJ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2022-30997.
The severity of CVE-2022-30997 is critical with a CVSS score of 7.2.
STARDOM FCN Controller and FCJ Controller versions R4.10 to R4.31 are affected by CVE-2022-30997.
An attacker with administrative privilege can read/change configuration settings or update the controller with tampered firmware.
You can find more information about CVE-2022-30997 at the following references: [link1](https://jvn.jp/vu/JVNVU95452299/index.html), [link2](https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf), [link3](https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf).