Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 10 |
CVE-ID | CVE-2022-21194 CVE-2022-23402 CVE-2022-21808 CVE-2022-22729 CVE-2022-22151 CVE-2022-21177 CVE-2022-22145 CVE-2022-22148 CVE-2022-22141 CVE-2022-23401 |
CWE-ID | CWE-798 CWE-22 CWE-287 CWE-117 CWE-400 CWE-78 CWE-269 CWE-427 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
CENTUM VP Web applications / Remote management & hosting panels CENTUM CS 3000 Web applications / Remote management & hosting panels Exaopc Web applications / CMS CENTUM CS 3000 Entry Class Hardware solutions / Firmware CENTUM VP Entry Class Hardware solutions / Firmware |
Vendor | Yokogawa |
Security Bulletin
This security bulletin contains information about 10 vulnerabilities.
EUVDB-ID: #VU61673
Risk: Low
CVSSv3.1: 6.2 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21194
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker on the local network can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.79
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61674
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23402
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code within the CAMS server application. A remote unauthenticated attacker on the local network can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61676
Risk: Low
CVSSv3.1: 6.2 [CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21808
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker on the local network can send a specially crafted packet to a CAMS for HIS server and read and write arbitrary files on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61677
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22729
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to CAMS for HIS Server improperly authenticate the receiving packets. A remote user can bypass authentication process and gain unauthorized access to the application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61678
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22151
CWE-ID:
CWE-117 - Improper Output Neutralization for Logs
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to CAMS for HIS Log Server fails to properly neutralize log outputs. A remote user can cause a denial of service conditon on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61679
Risk: Medium
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-21177
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in CAMS for HIS Log Server. A remote user can send a specially crafted HTTP request and create or overwritte arbitrary files on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61680
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22145
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in CAMS for HIS Log Server. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61682
Risk: Low
CVSSv3.1: 7.5 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22148
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to inappropriate access privilege in Root Service function. A local attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61683
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22141
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to escalate privileges.
The vulnerability exists due to inappropriate access privilege vulnerability in Long-term Data Archive Package. A local attacker can utilize a named pipe with inappropriate access privileges to delete arbitrary files.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61684
Risk: Medium
CVSSv3.1: 7.2 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23401
CWE-ID:
CWE-427 - Uncontrolled Search Path Element
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote attacker on the local network can place a specially crafted .dll file and execute arbitrary code on victim's system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCENTUM VP: R4.01 - R6.08
Exaopc: R3.72 - R3.78
CENTUM CS 3000: R3.08.10 - R3.09.00
CENTUM CS 3000 Entry Class: R3.08.10 - R3.09.00
CENTUM VP Entry Class: R4.01 - R6.08
CPE2.3http://ics-cert.us-cert.gov/advisories/icsa-22-083-01
http://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.