Known Vulnerabilities for products from Yokogawa

Listed below are 20 of the newest known vulnerabilities associated with the vendor "Yokogawa".

These CVEs are retrieved based on exact matches on listed vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed vendor information are still displayed.

Data on known vulnerable products is also displayed based on information from known CPEs, each product links to its respective vulnerability page.

Additional devices specifications by Yokogawa can be found at device.report : Yokogawa

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-23402 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 9.8 - CRITICAL 2022-03-11 2022-03-18
CVE-2022-23401 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 7.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-22729 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 8.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-22151 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 8.1 - HIGH 2022-03-11 2022-03-18
CVE-2022-22148 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 7.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-22145 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 8.1 - HIGH 2022-03-11 2022-03-18
CVE-2022-22141 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 7.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-21808 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 8.8 - HIGH 2022-03-11 2022-03-18
CVE-2022-21194 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 9.8 - CRITICAL 2022-03-11 2022-03-18
CVE-2022-21177 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 8.1 - HIGH 2022-03-11 2022-03-18
CVE-2020-16232 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new secur... 9.8 - CRITICAL 2022-03-18 2022-03-28
CVE-2020-5609 Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM... 9.8 - CRITICAL 2020-08-05 2020-08-12
CVE-2020-5608 CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic)... 9.8 - CRITICAL 2020-08-05 2020-08-12
CVE-2019-6008 An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10... 7.8 - HIGH 2019-12-26 2020-01-08
CVE-2019-5909 License Manager Service of YOKOGAWA products (CENTUM VP (R5.01.00 - R6.06.00), CENTUM VP Entry Class (R5.01.00 - R6.06.00), P... 9.8 - CRITICAL 2019-02-13 2020-08-24
CVE-2018-17902 Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple ... 5.3 - MEDIUM 2018-10-12 2019-10-09
CVE-2018-17900 Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly pro... 9.8 - CRITICAL 2018-10-12 2019-10-09
CVE-2018-17898 Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The controller application fails to... 7.5 - HIGH 2018-10-12 2019-10-09
CVE-2018-17896 Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize h... 8.1 - HIGH 2018-10-12 2019-10-09
CVE-2018-16196 Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 300... 7.5 - HIGH 2019-01-09 2019-02-14

Known software with vulnerabilities from Yokogawa

Type Vendor Product Version
HardwareYokogawaAaasuite-
HardwareYokogawaB/m9000 Vp-
Operating
System
YokogawaB/m9000 Vp Firmwarer7.30.01
ApplicationYokogawaB/m9000 Vp Software7.03.01
HardwareYokogawaB/m9000cs-
Operating
System
YokogawaB/m9000cs Firmwarer5.05.01
ApplicationYokogawaB/m9000cs Software5.05.01
HardwareYokogawaCentum Cs 1000-
Operating
System
YokogawaCentum Cs 1000 Firmwarer3.08.70
ApplicationYokogawaCentum Cs 1000 Software-
HardwareYokogawaCentum Cs 3000-
HardwareYokogawaCentum Cs 3000 Entry-
HardwareYokogawaCentum Cs 3000 Entry Class-
ApplicationYokogawaCentum Cs 3000 Entry Class Software3.09.50
Operating
System
YokogawaCentum Cs 3000 Entry Firmwarer3.09.50
Operating
System
YokogawaCentum Cs 3000 Firmwarer3.09.50
ApplicationYokogawaCentum Cs 3000 Software2.23.00
HardwareYokogawaCentum Event Viewer Package-
HardwareYokogawaCentum Long-term Trend Historian-
HardwareYokogawaCentum Vp-

Popular searches for "Yokogawa"

Yokogawa Electric

Yokogawa Electric Yokogawa Electric Corporation is a Japanese multinational electrical engineering and software company, with businesses based on its measurement, control, and information technologies. It has a global workforce of over 19,000 employees, 84 subsidiary and 3 affiliated companies operating in 55 countries. The company is listed on the Tokyo Stock Exchange and is a constituent of the Nikkei 225 stock index. Wikipedia

Yokogawa

Yokogawa N JYokogawa was a town located in Aira District, Kagoshima Prefecture, Japan. Wikipedia

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report