Yokogawa Electric Corporation CENTUM系列明文存储漏洞(CVE-2023-26593)
CVE编号
CVE-2023-26593利用情况
暂无补丁情况
N/A披露时间
2023-04-06漏洞描述
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://jvn.jp/en/vu/JVNVU98775218/ | |
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-adv... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | yokogawa | b/m9000cs | * | From (including) r5.04.01 | Up to (including) r5.05.01 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | b/m9000_vp | * | From (including) r6.01.01 | Up to (including) r7.04.51 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | b/m9000_vp | * | From (including) r8.01.01 | |||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_cs_1000 | * | From (including) r2.01.00 | Up to (including) r3.09.50 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_cs_3000 | * | From (including) r2.01.00 | Up to (including) r3.09.50 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_cs_3000_entry_class | * | From (including) r2.01.00 | Up to (including) r3.09.50 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_vp | * | From (including) r4.01.00 | Up to (including) r4.03.00 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_vp | * | From (including) r5.01.00 | Up to (including) r5.04.20 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_vp | * | From (including) r6.01.00 | |||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_vp_entry_class | * | From (including) r4.01.00 | Up to (including) r4.02.00 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_vp_entry_class | * | From (including) r5.01.00 | Up to (including) r5.04.20 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | centum_vp_entry_class | * | From (including) r6.01.00 | |||||
运行在以下环境 | |||||||||
应用 | yokogawa | exaopc | * | From (including) r1.01.00 | Up to (including) r1.20.00 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | exaopc | * | From (including) r2.01.00 | Up to (including) r2.10.00 | ||||
运行在以下环境 | |||||||||
应用 | yokogawa | exaopc | * | From (including) r3.01.00 |
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-312 | 敏感数据的明文存储 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论