Vulnerabilites related to yokogawa - stardom_fcn_firmware
CVE-2022-30997 (GCVE-0-2022-30997)
Vulnerability from cvelistv5
Published
2022-06-28 10:06
Modified
2024-08-03 07:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Use of Hard-coded Credentials
Summary
Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yokogawa Electric Corporation | STARDOM Controller |
Version: STARDOM FCN Controller and FCJ Controller R4.10 to R4.31 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:yokogawa:stardom_fcj_firmware:r4.10:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "stardom_fcj_firmware", "vendor": "yokogawa", "versions": [ { "lessThanOrEqual": "r4.31", "status": "affected", "version": "r4.10", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:yokogawa:stardom_fcn_firmware:r4.10:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "stardom_fcn_firmware", "vendor": "yokogawa", "versions": [ { "lessThanOrEqual": "r4.31", "status": "affected", "version": "r4.10", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-30997", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T19:56:59.327177Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-26T20:01:46.457Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "STARDOM Controller", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "STARDOM FCN Controller and FCJ Controller R4.10 to R4.31" } ] } ], "descriptions": [ { "lang": "en", "value": "Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware." } ], "problemTypes": [ { "descriptions": [ { "description": "Use of Hard-coded Credentials", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-28T10:06:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-30997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "STARDOM Controller", "version": { "version_data": [ { "version_value": "STARDOM FCN Controller and FCJ Controller R4.10 to R4.31" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use of Hard-coded Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "name": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "name": "https://jvn.jp/vu/JVNVU95452299/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-30997", "datePublished": "2022-06-28T10:06:01", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T07:03:40.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-5915 (GCVE-0-2023-5915)
Vulnerability from cvelistv5
Published
2023-12-01 06:12
Modified
2024-08-02 08:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition.
The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yokogawa Electric Corporation | STARDOM |
Version: STARDOM FCN/FCJ R1.01 to R4.31 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:24.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95177889/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "STARDOM", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "STARDOM FCN/FCJ R1.01 to R4.31" } ] } ], "datePublic": "2023-12-01T03:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation.\u0026nbsp;This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller\u2019s operation is not stopped by the condition.\u003cbr\u003e\u003cbr\u003eThe affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.\u003cbr\u003e" } ], "value": "A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation.\u00a0This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller\u2019s operation is not stopped by the condition.\n\nThe affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-01T06:14:45.335Z", "orgId": "7168b535-132a-4efe-a076-338f829b2eb9", "shortName": "YokogawaGroup" }, "references": [ { "url": "https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf" }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02" }, { "url": "https://jvn.jp/vu/JVNVU95177889/index.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7168b535-132a-4efe-a076-338f829b2eb9", "assignerShortName": "YokogawaGroup", "cveId": "CVE-2023-5915", "datePublished": "2023-12-01T06:12:03.581Z", "dateReserved": "2023-11-02T04:37:11.569Z", "dateUpdated": "2024-08-02T08:14:24.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29519 (GCVE-0-2022-29519)
Vulnerability from cvelistv5
Published
2022-06-28 10:05
Modified
2024-08-03 06:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cleartext Transmission of Sensitive Information
Summary
Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Yokogawa Electric Corporation | STARDOM Controller |
Version: STARDOM FCN Controller and FCJ Controller R1.01 to R4.31 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:26:05.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "STARDOM Controller", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "STARDOM FCN Controller and FCJ Controller R1.01 to R4.31" } ] } ], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware." } ], "problemTypes": [ { "descriptions": [ { "description": "Cleartext Transmission of Sensitive Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-28T10:05:31", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-29519", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "STARDOM Controller", "version": { "version_data": [ { "version_value": "STARDOM FCN Controller and FCJ Controller R1.01 to R4.31" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "name": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "name": "https://jvn.jp/vu/JVNVU95452299/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-29519", "datePublished": "2022-06-28T10:05:31", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T06:26:05.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-06-28 13:15
Modified
2024-11-21 06:59
Severity ?
Summary
Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yokogawa | stardom_fcj_firmware | * | |
yokogawa | stardom_fcj | - | |
yokogawa | stardom_fcn_firmware | * | |
yokogawa | stardom_fcn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_fcj_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03BF3DA1-FA1C-4633-A665-EE5826650EC8", "versionEndIncluding": "r4.31", "versionStartIncluding": "r1.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_fcj:-:*:*:*:*:*:*:*", "matchCriteriaId": "37EFAADB-EF41-4B63-A9C4-9A410682F47D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_fcn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A08E6234-7D44-4C8D-9D5B-373A085D0716", "versionEndIncluding": "r4.31", "versionStartIncluding": "r1.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_fcn:-:*:*:*:*:*:*:*", "matchCriteriaId": "6051604E-7FAF-44D7-BDB6-7D2D71DFC416", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de transmisi\u00f3n de texto sin cifrar de informaci\u00f3n confidencial en STARDOM FCN Controller y FCJ Controller versiones R1.01 a R4.31, que puede permitir a un atacante adyacente iniciar sesi\u00f3n en los productos afectados y alterar los ajustes de configuraci\u00f3n del dispositivo o manipular el firmware del mismo" } ], "id": "CVE-2022-29519", "lastModified": "2024-11-21T06:59:14.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-28T13:15:12.377", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-28 13:15
Modified
2024-11-21 07:03
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
6.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Summary
Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yokogawa | stardom_fcj_firmware | * | |
yokogawa | stardom_fcj | - | |
yokogawa | stardom_fcn_firmware | * | |
yokogawa | stardom_fcn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_fcj_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1D4C-918E-4513-A8B9-FEFD2B5BF4DA", "versionEndIncluding": "r4.31", "versionStartIncluding": "r4.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_fcj:-:*:*:*:*:*:*:*", "matchCriteriaId": "37EFAADB-EF41-4B63-A9C4-9A410682F47D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_fcn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2CA2151-1567-4F30-BF53-6A537EA3E505", "versionEndIncluding": "r4.31", "versionStartIncluding": "r4.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_fcn:-:*:*:*:*:*:*:*", "matchCriteriaId": "6051604E-7FAF-44D7-BDB6-7D2D71DFC416", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware." }, { "lang": "es", "value": "Se presenta una vulnerabilidad en el uso de credenciales embebidas en el controlador STARDOM FCN y en el controlador FCJ versiones R4.10 a R4.31, que puede permitir a un atacante con un privilegio administrativo leer/cambiar los ajustes de configuraci\u00f3n o actualizar el controlador con un firmware manipulado" } ], "id": "CVE-2022-30997", "lastModified": "2024-11-21T07:03:40.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.4, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-06-28T13:15:12.607", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU95452299/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-01 07:15
Modified
2024-11-21 08:42
Severity ?
Summary
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition.
The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
References
▶ | URL | Tags | |
---|---|---|---|
7168b535-132a-4efe-a076-338f829b2eb9 | https://jvn.jp/vu/JVNVU95177889/index.html | Mitigation, Third Party Advisory | |
7168b535-132a-4efe-a076-338f829b2eb9 | https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf | Mitigation, Vendor Advisory | |
7168b535-132a-4efe-a076-338f829b2eb9 | https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU95177889/index.html | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yokogawa | stardom_fcj_firmware | * | |
yokogawa | stardom_fcj | - | |
yokogawa | stardom_fcn_firmware | * | |
yokogawa | stardom_fcn | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_fcj_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03BF3DA1-FA1C-4633-A665-EE5826650EC8", "versionEndIncluding": "r4.31", "versionStartIncluding": "r1.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_fcj:-:*:*:*:*:*:*:*", "matchCriteriaId": "37EFAADB-EF41-4B63-A9C4-9A410682F47D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_fcn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A08E6234-7D44-4C8D-9D5B-373A085D0716", "versionEndIncluding": "r4.31", "versionStartIncluding": "r1.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_fcn:-:*:*:*:*:*:*:*", "matchCriteriaId": "6051604E-7FAF-44D7-BDB6-7D2D71DFC416", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation.\u00a0This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller\u2019s operation is not stopped by the condition.\n\nThe affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.\n" }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad de consumo incontrolado de recursos en STARDOM proporcionado por Yokogawa Electric Corporation. Esta vulnerabilidad puede permitir que un atacante remoto cause una condici\u00f3n de denegaci\u00f3n de servicio al controlador FCN/FCJ mediante el env\u00edo de un paquete manipulado. Mientras se enviaba el paquete, no se pudo acceder a la p\u00e1gina de inicio de mantenimiento del controlador. Por lo tanto, las funciones de la p\u00e1gina de inicio de mantenimiento, cambio de configuraci\u00f3n, visualizaci\u00f3n de registros, etc. no est\u00e1n disponibles. Pero la condici\u00f3n no detiene el funcionamiento del controlador. Los productos y versiones afectados son los siguientes: STARDOM FCN/FCJ R1.01 a R4.31." } ], "id": "CVE-2023-5915", "lastModified": "2024-11-21T08:42:46.090", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-01T07:15:12.627", "references": [ { "source": "7168b535-132a-4efe-a076-338f829b2eb9", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU95177889/index.html" }, { "source": "7168b535-132a-4efe-a076-338f829b2eb9", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf" }, { "source": "7168b535-132a-4efe-a076-338f829b2eb9", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU95177889/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02" } ], "sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "7168b535-132a-4efe-a076-338f829b2eb9", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }