#VU62777 OS Command Injection in Yokogawa products - CVE-2022-27188

 

#VU62777 OS Command Injection in Yokogawa products - CVE-2022-27188

Published: May 4, 2022


Vulnerability identifier: #VU62777
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-27188
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
CENTUM VP
B/M9000 VP
CENTUM VP Entry Class
Software vendor:
Yokogawa

Description

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A local user can tamper with files generated by the graphic builder and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links