SB2022032906 - Multiple vulnerabilities in Yokogawa CENTUM and Exaopc
Published: March 29, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Use of hard-coded credentials (CVE-ID: CVE-2022-21194)
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker on the local network can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Use of hard-coded credentials (CVE-ID: CVE-2022-23402)
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code within the CAMS server application. A remote unauthenticated attacker on the local network can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Path traversal (CVE-ID: CVE-2022-21808)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker on the local network can send a specially crafted packet to a CAMS for HIS server and read and write arbitrary files on the system.
4) Improper Authentication (CVE-ID: CVE-2022-22729)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to CAMS for HIS Server improperly authenticate the receiving packets. A remote user can bypass authentication process and gain unauthorized access to the application.
5) Improper Output Neutralization for Logs (CVE-ID: CVE-2022-22151)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to CAMS for HIS Log Server fails to properly neutralize log outputs. A remote user can cause a denial of service conditon on the target system.
6) Path traversal (CVE-ID: CVE-2022-21177)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in CAMS for HIS Log Server. A remote user can send a specially crafted HTTP request and create or overwritte arbitrary files on the system.
7) Resource exhaustion (CVE-ID: CVE-2022-22145)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in CAMS for HIS Log Server. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.
8) OS Command Injection (CVE-ID: CVE-2022-22148)
The vulnerability allows a local attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to inappropriate access privilege in Root Service function. A local attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Improper Privilege Management (CVE-ID: CVE-2022-22141)
The vulnerability allows a local attacker to escalate privileges.
The vulnerability exists due to inappropriate access privilege vulnerability in Long-term Data Archive Package. A local attacker can utilize a named pipe with inappropriate access privileges to delete arbitrary files.
10) Insecure DLL loading (CVE-ID: CVE-2022-23401)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote attacker on the local network can place a specially crafted .dll file and execute arbitrary code on victim's system.
Remediation
Install update from vendor's website.