9.3
CVE-2018-17896
- EPSS 0.25%
- Veröffentlicht 12.10.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:55:09
- Quelle ics-cert@hq.dhs.gov
- Teams Watchlist Login
- Unerledigt Login
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify information. This attack can be executed only during maintenance work.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Yokogawa ≫ Fcj Firmware Version <= r4.10
Yokogawa ≫ Fcn-100 Firmware Version <= r4.10
Yokogawa ≫ Fcn-rtu Firmware Version <= r4.10
Yokogawa ≫ Fcn-500 Firmware Version <= r4.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.25% | 0.451 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.