Yokogawa (CVE-2022-23402)

critical Tenable.ot Plugin ID 500625

Synopsis

The remote OT asset is affected by a vulnerability.

Description

The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00 This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

- The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00 (CVE-2022-23402)

Solution

Refer to the vendor advisory.

See Also

https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf

Plugin Details

Severity: Critical

ID: 500625

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 3/30/2022

Updated: 4/4/2022

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-23402

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:yokogawa:centum_vp_firmware, cpe:/o:yokogawa:centum_vp_entry_firmware

Required KB Items: Tenable.ot/Yokogawa

Exploit Ease: No known exploits are available

Patch Publication Date: 3/11/2022

Vulnerability Publication Date: 3/11/2022

Reference Information

CVE: CVE-2022-23402

CWE: 798