All the vulnerabilites related to yokogawa - b\/m9000vp
cve-2020-5608
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU97997181/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Yokogawa Electric Corporation | CAMS for HIS |
Version: CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CAMS for HIS", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01" } ] } ], "descriptions": [ { "lang": "en", "value": "CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered communication packets via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-05T13:13:02", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5608", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CAMS for HIS", "version": { "version_data": [ { "version_value": "CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered communication packets via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "name": "https://jvn.jp/vu/JVNVU97997181/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU97997181/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5608", "datePublished": "2020-08-05T13:13:02", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:30:24.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5609
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU97997181/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | Yokogawa Electric Corporation | CAMS for HIS |
Version: CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CAMS for HIS", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to create or overwrite arbitrary files and run arbitrary commands via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-05T13:12:59", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2020-5609", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CAMS for HIS", "version": { "version_data": [ { "version_value": "CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to create or overwrite arbitrary files and run arbitrary commands via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Directory traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "name": "https://jvn.jp/vu/JVNVU97997181/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU97997181/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2020-5609", "datePublished": "2020-08-05T13:12:59", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:30:24.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202008-0991
Vulnerability from variot
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to create or overwrite arbitrary files and run arbitrary commands via unspecified vectors. Provided by Yokogawa Electric Corporation CAMS for HIS Is vulnerable to several vulnerabilities: * Inappropriate authentication (CWE-287) - CVE-2020-5608 * Path traversal (CWE-22) - CVE-2020-5609The expected impact depends on each vulnerability, but it may be affected as follows. * A specially crafted communication packet is sent by an unauthenticated third party - CVE-2020-5608 * Unauthenticated third parties create or overwrite files in any location, or execute arbitrary commands - CVE-2020-5609
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-0991", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "centum vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.01.00" }, { "model": "centum cs 3000", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.08.10" }, { "model": "b\\/m9000cs", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.01" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r6.07.00" }, { "model": "b\\/m9000vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r8.03.01" }, { "model": "centum vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.01.00" }, { "model": "b\\/m9000vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r6.01.01" }, { "model": "centum cs 3000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.00" }, { "model": "b\\/m9000cs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.05.01" }, { "model": "centum vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r6.01.00" }, { "model": "b/m9000cs", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "vp r6.01.01 \u304b\u3089 r8.03.01" }, { "model": "b/m9000cs", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "r5.04.01 \u304b\u3089 r5.05.01" }, { "model": "centum cs 3000", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "(centum cs 3000 small \u542b\u3080) r3.08.10 \u304b\u3089 r3.09.50" }, { "model": "centum vp", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "(centum vp small, basic \u542b\u3080) r4.01.00 \u304b\u3089 r6.07.00" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5609" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r3.08.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r6.07.00", "versionStartIncluding": "r6.01.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.05.01", "versionStartIncluding": "r5.04.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r8.03.01", "versionStartIncluding": "r6.01.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5609" } ] }, "cve": "CVE-2020-5609", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-007129", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-007129", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2020-007129", "trust": 1.6, "value": "High" }, { "author": "NVD", "id": "CVE-2020-5609", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202008-164", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5609" }, { "db": "CNNVD", "id": "CNNVD-202008-164" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to create or overwrite arbitrary files and run arbitrary commands via unspecified vectors. Provided by Yokogawa Electric Corporation CAMS for HIS Is vulnerable to several vulnerabilities: * Inappropriate authentication (CWE-287) - CVE-2020-5608 * Path traversal (CWE-22) - CVE-2020-5609The expected impact depends on each vulnerability, but it may be affected as follows. * A specially crafted communication packet is sent by an unauthenticated third party - CVE-2020-5608 * Unauthenticated third parties create or overwrite files in any location, or execute arbitrary commands - CVE-2020-5609", "sources": [ { "db": "NVD", "id": "CVE-2020-5609" }, { "db": "JVNDB", "id": "JVNDB-2020-007129" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVNVU97997181", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2020-5609", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-20-224-01", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2020-007129", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.2759", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202008-164", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5609" }, { "db": "CNNVD", "id": "CNNVD-202008-164" } ] }, "id": "VAR-202008-0991", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.2410628 }, "last_update_date": "2023-12-18T13:07:29.108000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "YSAR-20-0001: CAMS for HIS\u306b\u8907\u6570\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://www.yokogawa.co.jp/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "title": "Yokogawa CAMS for HIS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=126322" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "CNNVD", "id": "CNNVD-202008-164" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5609" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://jvn.jp/vu/jvnvu97997181/index.html" }, { "trust": 1.6, "url": "https://web-material3.yokogawa.com/1/29820/files/ysar-20-0001-e.pdf" }, { "trust": 1.4, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-224-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5609" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5608" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5609" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu97997181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5608" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2759/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5609" }, { "db": "CNNVD", "id": "CNNVD-202008-164" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5609" }, { "db": "CNNVD", "id": "CNNVD-202008-164" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "date": "2020-08-05T14:15:13.187000", "db": "NVD", "id": "CVE-2020-5609" }, { "date": "2020-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-164" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "date": "2020-08-12T13:29:34.810000", "db": "NVD", "id": "CVE-2020-5609" }, { "date": "2021-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-164" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202008-164" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Yokogawa Electric CAMS for HIS Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202008-164" } ], "trust": 0.6 } }
var-202008-0990
Vulnerability from variot
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered communication packets via unspecified vectors. Provided by Yokogawa Electric Corporation CAMS for HIS Is vulnerable to several vulnerabilities: * Inappropriate authentication (CWE-287) - CVE-2020-5608 * Path traversal (CWE-22) - CVE-2020-5609The expected impact depends on each vulnerability, but it may be affected as follows. * A specially crafted communication packet is sent by an unauthenticated third party - CVE-2020-5608 * Unauthenticated third parties create or overwrite files in any location, or execute arbitrary commands - CVE-2020-5609
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202008-0990", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "centum vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.01.00" }, { "model": "centum cs 3000", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.08.10" }, { "model": "b\\/m9000cs", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.01" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r6.07.00" }, { "model": "b\\/m9000vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r8.03.01" }, { "model": "centum vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.01.00" }, { "model": "b\\/m9000vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r6.01.01" }, { "model": "centum cs 3000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.00" }, { "model": "b\\/m9000cs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.05.01" }, { "model": "centum vp", "scope": "gte", "trust": 1.0, "vendor": "yokogawa", "version": "r6.01.00" }, { "model": "b/m9000cs", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "vp r6.01.01 \u304b\u3089 r8.03.01" }, { "model": "b/m9000cs", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "r5.04.01 \u304b\u3089 r5.05.01" }, { "model": "centum cs 3000", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "(centum cs 3000 small \u542b\u3080) r3.08.10 \u304b\u3089 r3.09.50" }, { "model": "centum vp", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "(centum vp small, basic \u542b\u3080) r4.01.00 \u304b\u3089 r6.07.00" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5608" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r3.08.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r6.07.00", "versionStartIncluding": "r6.01.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.05.01", "versionStartIncluding": "r5.04.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r8.03.01", "versionStartIncluding": "r6.01.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5608" } ] }, "cve": "CVE-2020-5608", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-007129", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA score", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-007129", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2020-007129", "trust": 1.6, "value": "High" }, { "author": "NVD", "id": "CVE-2020-5608", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202008-165", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5608" }, { "db": "CNNVD", "id": "CNNVD-202008-165" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered communication packets via unspecified vectors. Provided by Yokogawa Electric Corporation CAMS for HIS Is vulnerable to several vulnerabilities: * Inappropriate authentication (CWE-287) - CVE-2020-5608 * Path traversal (CWE-22) - CVE-2020-5609The expected impact depends on each vulnerability, but it may be affected as follows. * A specially crafted communication packet is sent by an unauthenticated third party - CVE-2020-5608 * Unauthenticated third parties create or overwrite files in any location, or execute arbitrary commands - CVE-2020-5609", "sources": [ { "db": "NVD", "id": "CVE-2020-5608" }, { "db": "JVNDB", "id": "JVNDB-2020-007129" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVN", "id": "JVNVU97997181", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2020-5608", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-20-224-01", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2020-007129", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.2759", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202008-165", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5608" }, { "db": "CNNVD", "id": "CNNVD-202008-165" } ] }, "id": "VAR-202008-0990", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.2410628 }, "last_update_date": "2023-12-18T13:07:29.130000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "YSAR-20-0001: CAMS for HIS\u306b\u8907\u6570\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://www.yokogawa.co.jp/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "title": "Multiple Yokogawa Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=126323" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "CNNVD", "id": "CNNVD-202008-165" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-5608" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://jvn.jp/vu/jvnvu97997181/index.html" }, { "trust": 1.6, "url": "https://web-material3.yokogawa.com/1/29820/files/ysar-20-0001-e.pdf" }, { "trust": 1.4, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-224-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5608" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5608" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-5609" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu97997181" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5609" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2759/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5608" }, { "db": "CNNVD", "id": "CNNVD-202008-165" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "db": "NVD", "id": "CVE-2020-5608" }, { "db": "CNNVD", "id": "CNNVD-202008-165" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "date": "2020-08-05T14:15:13.107000", "db": "NVD", "id": "CVE-2020-5608" }, { "date": "2020-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-165" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007129" }, { "date": "2020-08-12T13:27:52.507000", "db": "NVD", "id": "CVE-2020-5608" }, { "date": "2020-08-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202008-165" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202008-165" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Yokogawa Electric CAMS for HIS Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007129" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202008-165" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
yokogawa | centum_cs_3000_firmware | * | |
yokogawa | centum_cs_3000 | - | |
yokogawa | centum_vp_firmware | * | |
yokogawa | centum_vp_firmware | * | |
yokogawa | centum_vp_firmware | * | |
yokogawa | centum_vp | - | |
yokogawa | b\/m9000cs_firmware | * | |
yokogawa | b\/m9000cs | - | |
yokogawa | b\/m9000vp_firmware | * | |
yokogawa | b\/m9000vp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CB5C1D3-A410-478C-AEBC-7A85A30B39BC", "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r3.08.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D63842-D6A8-4FA1-B09C-71E9113FF95A", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D647BA49-5A43-437B-8C58-0294A452AF8D", "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "041D122C-CAFD-4AA5-A45B-A51E2F024D67", "versionEndIncluding": "r6.07.00", "versionStartIncluding": "r6.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3131E58F-D32D-4FDC-AAD1-DE7BBAC10659", "versionEndIncluding": "r5.05.01", "versionStartIncluding": "r5.04.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6C0600F-87E0-4CE5-ACB9-49F160DB3D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9458CCD1-1820-4395-95CD-AEAC589DA4B2", "versionEndIncluding": "r8.03.01", "versionStartIncluding": "r6.01.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DDD4A8-FE34-4446-A0C2-4E282F881068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered communication packets via unspecified vectors." }, { "lang": "es", "value": "CAMS para HIS CENTUM CS 3000 (incluye CENTUM CS 3000 Small) versiones R3.08.10 hasta R3.09.50, CENTUM VP (incluye CENTUM VP Small, Basic) versiones R4.01.00 hasta R6.07.00, B/M9000CS versiones R5.04.01 hasta R5.05.01, y B/M9000 VP versiones R6.01.01 hasta R8.03.01, permite a un atacante remoto no autenticado omitir la autenticaci\u00f3n y enviar paquetes de comunicaci\u00f3n alterados por medio de vectores no especificados" } ], "id": "CVE-2020-5608", "lastModified": "2024-11-21T05:34:21.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-05T14:15:13.107", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
yokogawa | centum_cs_3000_firmware | * | |
yokogawa | centum_cs_3000 | - | |
yokogawa | centum_vp_firmware | * | |
yokogawa | centum_vp_firmware | * | |
yokogawa | centum_vp_firmware | * | |
yokogawa | centum_vp | - | |
yokogawa | b\/m9000cs_firmware | * | |
yokogawa | b\/m9000cs | - | |
yokogawa | b\/m9000vp_firmware | * | |
yokogawa | b\/m9000vp | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CB5C1D3-A410-478C-AEBC-7A85A30B39BC", "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r3.08.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D63842-D6A8-4FA1-B09C-71E9113FF95A", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D647BA49-5A43-437B-8C58-0294A452AF8D", "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "041D122C-CAFD-4AA5-A45B-A51E2F024D67", "versionEndIncluding": "r6.07.00", "versionStartIncluding": "r6.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3131E58F-D32D-4FDC-AAD1-DE7BBAC10659", "versionEndIncluding": "r5.05.01", "versionStartIncluding": "r5.04.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6C0600F-87E0-4CE5-ACB9-49F160DB3D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9458CCD1-1820-4395-95CD-AEAC589DA4B2", "versionEndIncluding": "r8.03.01", "versionStartIncluding": "r6.01.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DDD4A8-FE34-4446-A0C2-4E282F881068", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to create or overwrite arbitrary files and run arbitrary commands via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad salto de directorio en CAMS para HIS CENTUM CS 3000 (incluye CENTUM CS 3000 Small) versiones R3.08.10 hasta R3.09.50, CENTUM VP (incluye CENTUM VP Small, Basic) versiones R4.01.00 hasta R6.07.00, B/M9000CS versiones R5.04.01 hasta R5.05.01 y B/M9000 VP versiones R6.01.01 hasta R8.03.01, permiten a un atacante remoto no autenticado crear o sobrescribir archivos arbitrarios y ejecutar comandos arbitrarios por medio de vectores no especificados" } ], "id": "CVE-2020-5609", "lastModified": "2024-11-21T05:34:21.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-05T14:15:13.187", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU97997181/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }