CVE-2022-30707 | Tenable®

- Plugins
- Overview
- Plugins Pipeline
- Newest
- Updated
- Search
- Nessus Families
- WAS Families
- NNM Families
- Tenable OT Security Families
- About Plugin Families
- Release Notes
- Audits
- Overview
- Newest
- Updated
- Search Audit Files
- Search Items
- References
- Authorities
- Documentation
- Download All Audit Files
- Indicators
- Overview
- Search
- Indicators of Attack
- Indicators of Exposure
- Release Notes
- CVEs
- Overview
- Newest
- Updated
- Search
- Attack Path Techniques
- Overview
- Search
Detections
- Plugins
- Overview
- Plugins Pipeline
- Release Notes
- Newest
- Updated
- Search
- Nessus Families
- WAS Families
- NNM Families
- Tenable OT Security Families
- About Plugin Families
- Audits
- Overview
- Newest
- Updated
- Search Audit Files
- Search Items
- References
- Authorities
- Documentation
- Download All Audit Files
- Indicators
- Overview
- Search
- Indicators of Attack
- Indicators of Exposure
- Release Notes
Analytics
- CVEs
- Overview
- Newest
- Updated
- Search
- Attack Path Techniques
- Overview
- Search
- CVEs
- CVE-2022-30707
- CVEs
high
- Information
- CPEs
- Plugins
Description
Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration.
References
- Advisories
- More
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02
https://jvn.jp/vu/JVNVU92819891/index.html
https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf
https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf
Details
Source: Mitre, NVD
Published: 2022-06-28
Updated: 2023-08-08
Risk Information
CVSS v2
Base Score: 5.4
Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium
CVSS v3
Base Score: 8.8
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS
EPSS: 0.00158
Từ khóa » B/m9000vp
-
A High-precision Color Sensor For The B/M9000VP System - Yokogawa
-
[PDF] General Specifications - Yokogawa
-
[PDF] A High-precision IR Moisture Sensor For The B/M9000VP System
-
Multiple Vulnerabilities In Yokogawa CENTUM, ProSafe-RS And B ...
-
Yokogawa B/m9000 Vp : CVE Security Vulnerabilities, Versions And ...
-
Yokogawa CVE - OpenCVE
-
List Of Versions - CVEbuzz
-
B/M9000 VP Firmware - Vicarius
-
Yokogawa B/m9000 Vp Software - OVAL Definitions
-
CVE-2022-27188 Detail - CVE Record | CVE
-
Yokogawa CENTUM And ProSafe-RS | CISA - US-CERT
-
Centum Vp Vulnerabilities And Exploits - Vulmon
-
General Specifications - Yokogawa - us
-
CVE-2014-3888 - The MITRE Corporation
-
Results For «a:yokogawa:b,m9000_vp:r8.01.01 - | CPE
-
[Control Systems] Yokogawa Security Advisory (AV22-346)
-
Details Of VAR-202204-0836