Lucene search

K
cve[email protected]CVE-2022-30707
HistoryJun 28, 2022 - 1:15 p.m.

CVE-2022-30707

2022-06-2813:15:12
web.nvd.nist.gov
35
5
cve-2022-30707
security vulnerability
cams
his
communication
centum series
centum vp
exaopc
b/m9000 cs
b/m9000 vp
data access

5.4 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.1%

Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 ‘For CENTUM VP Support CAMS for HIS’ is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration.

Affected configurations

NVD
Node
yokogawacentum_cs_3000_firmwareRanger3.08.10r3.09.00
AND
yokogawacentum_cs_3000Match-
Node
yokogawacentum_cs_3000_entry_class_firmwareRanger3.08.10r3.09.00
AND
yokogawacentum_cs_3000_entry_classMatch-
Node
yokogawacentum_vp_firmwareRanger4.01.00r4.03.00
OR
yokogawacentum_vp_firmwareRanger5.01.00r5.04.20
OR
yokogawacentum_vp_firmwareRanger6.01.00r6.09.00
AND
yokogawacentum_vpMatch-
Node
yokogawacentum_vp_entry_class_firmwareRanger4.01.00r4.03.00
OR
yokogawacentum_vp_entry_class_firmwareRanger5.01.00r5.04.20
OR
yokogawacentum_vp_entry_class_firmwareRanger6.01.00r6.09.00
AND
yokogawacentum_vp_entry_classMatch-
Node
yokogawaexaopcRanger3.72.00r3.80.00
Node
yokogawab\/m9000_vpRanger6.01.01r8.03.01
OR
yokogawab\/m9000csRanger5.04.01r5.05.01

CNA Affected

[
  {
    "product": "CAMS for HIS",
    "vendor": "Yokogawa Electric Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01"
      }
    ]
  }
]

Social References

More

5.4 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.1%

Related for CVE-2022-30707