Known Vulnerabilities for Exaopc by Yokogawa

Listed below are 10 of the newest known vulnerabilities associated with "Exaopc" by "Yokogawa".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

More device details and information can be found at device.report here: Yokogawa Exaopc

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-23402 The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.0... 9.8 - CRITICAL 2022-03-11 2022-03-18
CVE-2022-23401 The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.... 7.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-22729 CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The ... 8.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-22151 CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTU... 8.1 - HIGH 2022-03-11 2022-03-18
CVE-2022-22148 'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL conf... 7.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-22145 CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncontrolled resource consumpt... 8.1 - HIGH 2022-03-11 2022-03-18
CVE-2022-22141 'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products creates some named pipe with... 7.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-21808 Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3... 8.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-21194 The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial config... 9.8 - CRITICAL 2022-03-11 2022-03-18
CVE-2022-21177 There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CEN... 8.1 - HIGH 2022-03-11 2022-03-18

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationYokogawaExaopcr3.77.00AllAllAll
ApplicationYokogawaExaopcr3.72.00AllAllAll
ApplicationYokogawaExaopcr1.01.00AllAllAll
ApplicationYokogawaExaopc3.72.00AllAllAll
ApplicationYokogawaExaopc3.71.10AllAllAll
ApplicationYokogawaExaopc3.71.02AllAllAll
HardwareYokogawaExaopc-AllAllAll
ApplicationYokogawaExaopc-AllAllAll

Popular searches for Exaopc

Yokogawa CENTUM and Exaopc Vulnerability (Update A) | CISA

us-cert.cisa.gov/ics/advisories/ICSA-14-260-01A

Yokogawa CENTUM and Exaopc Vulnerability Update A | CISA Yokogawa CENTUM and Exaopc Vulnerability Update A Original release date: December 02, 2014 | Last revised: September 05, 2018 Legal Notice. This updated advisory is a follow-up to the original advisory titled ICSA-14-260-01 Yokogawa CENTUM and Exaopc Vulnerability that was published September 17, 2014, on the NCCIC/ICS-CERT web site. Tod Beardsley of Rapid7 Inc. and Jim Denaro of CipherLaw have identified an authentication vulnerability and released proof-of-concept exploit code for the Yokogawa CENTUM CS 3000 series and Exaopc products. The following Yokogawa Exaopc version is affected:.

Vulnerability (computing) Yokogawa Electric Exploit (computer security) Website United States Computer Emergency Readiness Team ISACA Authentication National Cybersecurity and Communications Integration Center Patch (computing) International Computer Security Association Computer security Product (business) Transmission Control Protocol Certiorari Cassette tape Common Vulnerabilities and Exposures Control system Virtual private network Computer file Inc. (magazine)

Yokogawa CENTUM and Exaopc | CISA

us-cert.cisa.gov/ics/advisories/ICSA-18-102-01

Yokogawa CENTUM and Exaopc X V T Original release date: April 12, 2018 | Last revised: April 13, 2018 Legal Notice. Exaopc # ! R3.75.00 and prior,. Yokogawa For any questions related to this report, please contact the CISA at:.

Yokogawa Electric ISACA Vulnerability (computing) Website Vice president Vulnerability management Product (business) Computer security Exploit (computer security) Virtual private network United States Computer Emergency Readiness Team National Cybersecurity and Communications Integration Center User (computing) Common Vulnerability Scoring System Notice Control system Industrial control system Process (computing) HTTPS Software versioning

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report