Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-10592 |
CWE-ID | CWE-798 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
STARDOM FCN-500 Server applications / SCADA systems STARDOM FCN-RTU Server applications / SCADA systems STARDOM FCN-100 Server applications / SCADA systems STARDOM FCJ Server applications / SCADA systems |
Vendor | Yokogawa |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU13118
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-10592
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain elevated privieleges on the target system.
The vulnerability exists due to use of hard-coded credentials. A remote unauthenticated attacker can use these credentials to gain elevated privileges and execute arbitrary code.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate to version 4.10.
Vulnerable software versionsSTARDOM FCN-500: All versions
STARDOM FCN-RTU: All versions
STARDOM FCN-100: All versions
STARDOM FCJ: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/ICSA-18-151-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.