9.8

CVE-2022-23402

The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
YokogawaCentum Vp Firmware Version >= r5.01.00 <= r5.04.20
   YokogawaCentum Vp Version-
YokogawaCentum Vp Firmware Version >= r6.01.00 < r6.09.00
   YokogawaCentum Vp Version-
YokogawaCentum Vp Entry Firmware Version >= r5.01.00 <= r5.04.20
   YokogawaCentum Vp Entry Version-
YokogawaCentum Vp Entry Firmware Version >= r6.01.00 < r6.09.00
   YokogawaCentum Vp Entry Version-
YokogawaExaopc Version >= r3.72.00 < r3.80.00
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.41% 0.584
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.