Packet Authentication Bypass in Yokogawa Electric's CAMS for HIS Server
CVE-2022-22729

8.8HIGH

Key Information:

Vendor
CVE Published:
11 March 2022

Summary

A vulnerability exists in the CAMS for HIS Server within various Yokogawa Electric products due to improper packet authentication. Malicious actors may exploit this weakness by sending crafted packets that can bypass authentication measures. This issue affects multiple versions of CENTUM CS 3000, CENTUM VP, and Exaopc, allowing potentially unauthorized access to sensitive system components.

Affected Version(s)

CENTUM CS 3000 versions from R3.08.10 to R3.09.00

CENTUM VP versions from R4.01.00 to R4.03.00

CENTUM VP versions from R5.01.00 to R5.04.20

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.