CVE-2022-23402
Published on: Not Yet Published
Last Modified on: 03/18/2022 02:04:00 PM UTC
Certain versions of Centum Vp from Yokogawa contain the following vulnerability:
The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00
- CVE-2022-23402 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
Yokogawa Electric Corporation - CENTUM VP version versions from R5.01.00 to R5.04.20
- Affected Vendor/Software:
Yokogawa Electric Corporation - CENTUM VP version versions from R6.01.00 to R6.08.00
- Affected Vendor/Software:
Yokogawa Electric Corporation - Exaopc version versions from R3.72.00 to R3.79.00
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 7.5 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
web-material3.yokogawa.com application/pdf |
![]() |
Related QID Numbers
- 590868 Yokogawa CENTUM Multiple Vulnerabilities (ICSA-22-083-01) (YSAR-22-0001)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware
| Yokogawa | Centum Vp | - | All | All | All |
Hardware
| Yokogawa | Centum Vp Entry | - | All | All | All |
Operating System | Yokogawa | Centum Vp Entry Firmware | All | All | All | All |
Operating System | Yokogawa | Centum Vp Entry Firmware | All | All | All | All |
Operating System | Yokogawa | Centum Vp Firmware | All | All | All | All |
Operating System | Yokogawa | Centum Vp Firmware | All | All | All | All |
Application | Yokogawa | Exaopc | All | All | All | All |
- cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*:
- cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-23402 : The following Yokogawa Electric products hard-code the password for CAMS server applications: CENT… twitter.com/i/web/status/1… | 2022-03-11 09:20:18 |
![]() |
Potentially Critical CVE Detected! CVE-2022-23402 The following Yokogawa Electric products hard-code the password f… twitter.com/i/web/status/1… | 2022-03-11 10:56:02 |
![]() |
CVE-2022-23402 | 2022-03-11 10:38:24 |