Yokogawa Electric Corporation CENTUM系列明文存储漏洞(CVE-2023-26593)

admin 2023-11-30 02:44:03 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
Yokogawa Electric Corporation CENTUM系列明文存储漏洞(CVE-2023-26593)

CVE编号

CVE-2023-26593

利用情况

暂无

补丁情况

N/A

披露时间

2023-04-06
漏洞描述
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://jvn.jp/en/vu/JVNVU98775218/
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-adv...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 yokogawa b/m9000cs * From (including) r5.04.01 Up to (including) r5.05.01
运行在以下环境
应用 yokogawa b/m9000_vp * From (including) r6.01.01 Up to (including) r7.04.51
运行在以下环境
应用 yokogawa b/m9000_vp * From (including) r8.01.01
运行在以下环境
应用 yokogawa centum_cs_1000 * From (including) r2.01.00 Up to (including) r3.09.50
运行在以下环境
应用 yokogawa centum_cs_3000 * From (including) r2.01.00 Up to (including) r3.09.50
运行在以下环境
应用 yokogawa centum_cs_3000_entry_class * From (including) r2.01.00 Up to (including) r3.09.50
运行在以下环境
应用 yokogawa centum_vp * From (including) r4.01.00 Up to (including) r4.03.00
运行在以下环境
应用 yokogawa centum_vp * From (including) r5.01.00 Up to (including) r5.04.20
运行在以下环境
应用 yokogawa centum_vp * From (including) r6.01.00
运行在以下环境
应用 yokogawa centum_vp_entry_class * From (including) r4.01.00 Up to (including) r4.02.00
运行在以下环境
应用 yokogawa centum_vp_entry_class * From (including) r5.01.00 Up to (including) r5.04.20
运行在以下环境
应用 yokogawa centum_vp_entry_class * From (including) r6.01.00
运行在以下环境
应用 yokogawa exaopc * From (including) r1.01.00 Up to (including) r1.20.00
运行在以下环境
应用 yokogawa exaopc * From (including) r2.01.00 Up to (including) r2.10.00
运行在以下环境
应用 yokogawa exaopc * From (including) r3.01.00
CVSS3评分 7.8
  • 攻击路径 本地
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-312 敏感数据的明文存储
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0