Yokogawa (CVE-2022-22148)

high Tenable.ot Plugin ID 500613

Synopsis

The remote OT asset is affected by a vulnerability.

Description

'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00. This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

- 'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00. (CVE-2022-22148)

Solution

Refer to the vendor advisory.

See Also

https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf

Plugin Details

Severity: High

ID: 500613

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 3/18/2022

Updated: 3/22/2022

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-22148

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:yokogawa:centum_cs_3000_firmware, cpe:/o:yokogawa:centum_cs_3000_entry_firmware, cpe:/o:yokogawa:centum_vp_firmware, cpe:/o:yokogawa:centum_vp_entry_firmware

Required KB Items: Tenable.ot/Yokogawa

Exploit Ease: No known exploits are available

Patch Publication Date: 3/11/2022

Vulnerability Publication Date: 3/11/2022

Reference Information

CVE: CVE-2022-22148

CWE: 732