Security Flaw in Yokogawa Electric CENTUM VP and Exaopc Products
CVE-2022-21194
9.8CRITICAL
Key Information:
- Vendor
- CVE Published:
- 11 March 2022
Summary
Yokogawa Electric's CENTUM VP and Exaopc products are impacted by a vulnerability where the internal Windows accounts do not have their passwords changed from the default configuration. This oversight affects specific versions of CENTUM VP and Exaopc, potentially allowing unauthorized access if the default passwords remain in use. Users are encouraged to review and update their system settings to enhance security.
Affected Version(s)
CENTUM VP versions from R5.01.00 to R5.04.20
CENTUM VP versions from R6.01.00 to R6.08.00
Exaopc versions from R3.72.00 to R3.79.00
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved