First published: Mon Jun 17 2024(Updated: )
DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account. The affected products and versions are as follows: CENTUM CS 3000 R3.08.10 to R3.09.50 CENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.
Credit: 7168b535-132a-4efe-a076-338f829b2eb9
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa CENTUM CS 3000 | >=R3.08.10<=R3.09.50 | |
Yokogawa Centum VP Software | >=R4.01.00<=R4.03.00>=R5.01.00<=R5.04.20>=R6.01.00<=R6.11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5650 is classified as a high severity DLL Hijacking vulnerability that may allow unauthorized execution of arbitrary code.
To remediate CVE-2024-5650, ensure that affected versions of CENTUM CS 3000 and CENTUM VP are updated to the latest patched versions provided by Yokogawa Electric Corporation.
CVE-2024-5650 affects Yokogawa CENTUM CS 3000 versions R3.08.10 to R3.09.50 and CENTUM VP versions R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 to R6.11.10.
Yes, CVE-2024-5650 can be exploited if an attacker gains access to a computer with the vulnerable software or to a shared folder.
CVE-2024-5650 is primarily a DLL Hijacking vulnerability that allows attackers to replace legitimate DLL files with malicious ones.