All the vulnerabilites related to Yokogawa Electric Corporation - Exaopc
cve-2022-21177
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, andfrom R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.257Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, andfrom R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:39", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-21177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, andfrom R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23: Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-21177", "datePublished": "2022-03-11T09:10:39", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T02:31:59.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23401
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:45.875Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:51", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-23401", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427: Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-23401", "datePublished": "2022-03-11T09:10:51", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T03:43:45.875Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-21808
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 02:53
Severity ?
EPSS score ?
Summary
Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:53:36.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:42", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-21808", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23: Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-21808", "datePublished": "2022-03-11T09:10:42", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T02:53:36.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23402
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:45.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798: Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:53", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-23402", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-798: Use of Hard-coded Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-23402", "datePublished": "2022-03-11T09:10:53", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T03:43:45.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22729
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 03:21
Severity ?
EPSS score ?
Summary
CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:49.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-302", "description": "CWE-302: Authentication Bypass by Assumed-Immutable Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:50", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-22729", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-302: Authentication Bypass by Assumed-Immutable Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-22729", "datePublished": "2022-03-11T09:10:50", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T03:21:49.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22145
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 03:07
Severity ?
EPSS score ?
Summary
CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncontrolled resource consumption. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:48.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncontrolled resource consumption. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:45", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-22145", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncontrolled resource consumption. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-22145", "datePublished": "2022-03-11T09:10:45", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T03:07:48.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22141
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 03:07
Severity ?
EPSS score ?
Summary
'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:48.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "\u0027Long-term Data Archive Package\u0027 service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:43", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-22141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "\u0027Long-term Data Archive Package\u0027 service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732: Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-22141", "datePublished": "2022-03-11T09:10:44", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T03:07:48.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22148
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 03:07
Severity ?
EPSS score ?
Summary
'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:49.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "\u0027Root Service\u0027 service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:47", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-22148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "\u0027Root Service\u0027 service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732: Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-22148", "datePublished": "2022-03-11T09:10:47", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T03:07:49.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-21194
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 02:31
Severity ?
EPSS score ?
Summary
The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial configuration: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial configuration: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798: Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:41", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-21194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial configuration: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-798: Use of Hard-coded Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-21194", "datePublished": "2022-03-11T09:10:41", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T02:31:59.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22151
Vulnerability from cvelistv5
Published
2022-03-11 09:10
Modified
2024-08-03 03:07
Severity ?
EPSS score ?
Summary
CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:48.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 3000", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.08.10 to R3.09.00" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R4.01.00 to R4.03.00" }, { "status": "affected", "version": "versions from R5.01.00 to R5.04.20" }, { "status": "affected", "version": "versions from R6.01.00 to R6.08.00" } ] }, { "product": "Exaopc", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "versions from R3.72.00 to R3.79.00" } ] } ], "descriptions": [ { "lang": "en", "value": "CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-117", "description": "CWE-117: Improper Output Neutralization for Logs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-11T09:10:48", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-22151", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "versions from R3.08.10 to R3.09.00" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "versions from R4.01.00 to R4.03.00" }, { "version_value": "versions from R5.01.00 to R5.04.20" }, { "version_value": "versions from R6.01.00 to R6.08.00" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "versions from R3.72.00 to R3.79.00" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-117: Improper Output Neutralization for Logs" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf", "refsource": "CONFIRM", "url": "https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-22151", "datePublished": "2022-03-11T09:10:48", "dateReserved": "2022-02-03T00:00:00", "dateUpdated": "2024-08-03T03:07:48.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }