CVE-2014-5208CVE-2014-5208

Affected configuration(s):

cpe:/a:yokogawa:centum_cs_3000:r3.01
cpe:/a:yokogawa:centum_cs_3000:r3.02
cpe:/a:yokogawa:centum_cs_3000:r3.03
cpe:/a:yokogawa:centum_cs_3000:r3.04
cpe:/a:yokogawa:centum_cs_3000:r3.05
cpe:/a:yokogawa:centum_cs_3000:r3.06
cpe:/a:yokogawa:centum_cs_3000:r3.07
cpe:/a:yokogawa:centum_cs_3000:r3.08
cpe:/a:yokogawa:centum_cs_3000:r3.08.50
cpe:/a:yokogawa:centum_cs_3000:r3.08.70
cpe:/a:yokogawa:centum_cs_3000:r3.09
cpe:/a:yokogawa:centum_cs_3000:r3.09.50
cpe:/a:yokogawa:centum_vp:r4.03.00
cpe:/a:yokogawa:centum_vp:r5.01.00
cpe:/a:yokogawa:centum_vp:r5.01.20
cpe:/a:yokogawa:centum_vp:r5.02.00
cpe:/a:yokogawa:centum_vp:r5.03.00
cpe:/a:yokogawa:exaopc:3.71.10

Date published: 2014-12-22T12:59:00.063-05:00

Date last modified: 2014-12-22T14:27:03.713-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0003E.pdf

Summary: BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.