CRITICAL · 9.8

CVE-2022-23402

The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from ...

Vulnerability Description

The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
YokogawaCentum Vp Firmware>= r5.01.00, <= r5.04.20
YokogawaCentum Vp-
YokogawaCentum Vp Entry Firmware>= r5.01.00, <= r5.04.20
YokogawaCentum Vp Entry-
YokogawaExaopc>= r3.72.00, < r3.80.00

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-23402?

CVE-2022-23402 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from ...

How severe is CVE-2022-23402?

CVE-2022-23402 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2022-23402?

Check the references section above for vendor advisories and patch information. Affected products include: Yokogawa Centum Vp Firmware, Yokogawa Centum Vp, Yokogawa Centum Vp Entry Firmware, Yokogawa Centum Vp Entry, Yokogawa Exaopc.