{"api_version":"1","generated_at":"2026-05-06T08:14:44+00:00","cve":"CVE-2022-29519","urls":{"html":"https://cve.report/CVE-2022-29519","api":"https://cve.report/api/cve/CVE-2022-29519.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-29519","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-29519"},"summary":{"title":"CVE-2022-29519","description":"Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware.","state":"PUBLIC","assigner":"vultures@jpcert.or.jp","published_at":"2022-06-28 13:15:00","updated_at":"2022-07-08 14:57:00"},"problem_types":["CWE-319"],"metrics":[],"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01","refsource":"MISC","tags":[],"title":"Yokogawa STARDOM | CISA","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf","name":"https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf","name":"https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://jvn.jp/vu/JVNVU95452299/index.html","name":"https://jvn.jp/vu/JVNVU95452299/index.html","refsource":"MISC","tags":[],"title":"JVNVU#95452299: YOKOGAWA STARDOMのコントローラーに複数の脆弱性","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-29519","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29519","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"29519","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"yokogawa","cpe5":"stardom_fcj","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29519","vulnerable":"1","versionEndIncluding":"r4.31","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"yokogawa","cpe5":"stardom_fcj_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29519","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"yokogawa","cpe5":"stardom_fcn","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29519","vulnerable":"1","versionEndIncluding":"r4.31","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"yokogawa","cpe5":"stardom_fcn_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-29519","qid":"591105","title":"Yokogawa STARDOM Multiple Vulnerabilities (ICSA-22-174-01)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-29519","ASSIGNER":"vultures@jpcert.or.jp","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Yokogawa Electric Corporation","product":{"product_data":[{"product_name":"STARDOM Controller","version":{"version_data":[{"version_value":"STARDOM FCN Controller and FCJ Controller R1.01 to R4.31"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Cleartext Transmission of Sensitive Information"}]}]},"references":{"reference_data":[{"url":"https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf","refsource":"MISC","name":"https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf"},{"url":"https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf","refsource":"MISC","name":"https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf"},{"url":"https://jvn.jp/vu/JVNVU95452299/index.html","refsource":"MISC","name":"https://jvn.jp/vu/JVNVU95452299/index.html"},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01","refsource":"MISC","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01"}]},"description":{"description_data":[{"lang":"eng","value":"Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware."}]}},"nvd":{"publishedDate":"2022-06-28 13:15:00","lastModifiedDate":"2022-07-08 14:57:00","problem_types":["CWE-319"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:C/I:C/A:C","accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.9},"severity":"HIGH","exploitabilityScore":5.5,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:yokogawa:stardom_fcj_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r1.01","versionEndIncluding":"r4.31","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:yokogawa:stardom_fcj:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:yokogawa:stardom_fcn_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r1.01","versionEndIncluding":"r4.31","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:yokogawa:stardom_fcn:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}