#VU61682 OS Command Injection in Yokogawa products - CVE-2022-22148

 

#VU61682 OS Command Injection in Yokogawa products - CVE-2022-22148

Published: March 29, 2022


Vulnerability identifier: #VU61682
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-22148
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
CENTUM VP
CENTUM CS 3000
Exaopc
CENTUM CS 3000 Entry Class
CENTUM VP Entry Class
Software vendor:
Yokogawa

Description

The vulnerability allows a local attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to inappropriate access privilege in Root Service function. A local attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links