CVE-2024-5650 (GCVE-0-2024-5650)

Vulnerability from cvelistv5 – Published: 2024-06-17 06:21 – Updated: 2024-08-01 21:18
VLAI?
Summary
DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account. The affected products and versions are as follows: CENTUM CS 3000 R3.08.10 to R3.09.50 CENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.
CWE
Assigner
References
Impacted products
Vendor Product Version
Yokogawa Electric Corporation CENTUM CS 3000 Affected: R3.08.10 , ≤ R3.09.50 (custom)
Create a notification for this product.
    Yokogawa Electric Corporation CENTUM VP Affected: R4.01.00 , ≤ R4.03.00 (custom)
Affected: R5.01.00 , ≤ R5.04.20 (custom)
Affected: R6.01.00 , ≤ R6.11.10 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:yokogawa:centum_cs_3000:r3.08.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "centum_cs_3000",
            "vendor": "yokogawa",
            "versions": [
              {
                "lessThanOrEqual": "r3.09.50",
                "status": "affected",
                "version": "r3.08.10",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:yokogawa:centum_vp:r4.01.00:*:*:*:-:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "centum_vp",
            "vendor": "yokogawa",
            "versions": [
              {
                "lessThanOrEqual": "f4.03.00",
                "status": "affected",
                "version": "r4.01.00",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:yokogawa:centum_vp:r6.01.00:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "centum_vp",
            "vendor": "yokogawa",
            "versions": [
              {
                "lessThanOrEqual": "r5.04.20",
                "status": "affected",
                "version": "r5.01.00",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:yokogawa:centum_vp:r6.01.00:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "centum_vp",
            "vendor": "yokogawa",
            "versions": [
              {
                "lessThanOrEqual": "r6.11.10",
                "status": "affected",
                "version": "r6.01.00",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-5650",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-17T13:51:30.100377Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-17T13:51:32.570Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:18:06.883Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "CENTUM CS 3000",
          "vendor": "Yokogawa Electric Corporation",
          "versions": [
            {
              "lessThanOrEqual": "R3.09.50",
              "status": "affected",
              "version": "R3.08.10",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "CENTUM VP",
          "vendor": "Yokogawa Electric Corporation",
          "versions": [
            {
              "lessThanOrEqual": "R4.03.00",
              "status": "affected",
              "version": "R4.01.00",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R5.04.20",
              "status": "affected",
              "version": "R5.01.00",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "R6.11.10",
              "status": "affected",
              "version": "R6.01.00",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-06-17T03:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account.\u003cbr\u003e\u003cbr\u003eThe affected products and versions are as follows:\u003cbr\u003eCENTUM CS 3000 R3.08.10 to R3.09.50\u003cbr\u003eCENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10."
            }
          ],
          "value": "DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account.\n\nThe affected products and versions are as follows:\nCENTUM CS 3000 R3.08.10 to R3.09.50\nCENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-17T06:21:31.387Z",
        "orgId": "7168b535-132a-4efe-a076-338f829b2eb9",
        "shortName": "YokogawaGroup"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7168b535-132a-4efe-a076-338f829b2eb9",
    "assignerShortName": "YokogawaGroup",
    "cveId": "CVE-2024-5650",
    "datePublished": "2024-06-17T06:21:31.387Z",
    "dateReserved": "2024-06-05T05:32:13.103Z",
    "dateUpdated": "2024-08-01T21:18:06.883Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account.\\n\\nThe affected products and versions are as follows:\\nCENTUM CS 3000 R3.08.10 to R3.09.50\\nCENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.\"}, {\"lang\": \"es\", \"value\": \"Se ha encontrado una vulnerabilidad de secuestro de DLL en CENTUM CAMS Log server provided by Yokogawa Electric Corporation. Si un atacante de alguna manera puede ingresar a una computadora que instal\\u00f3 el producto afectado o acceder a una carpeta compartida, reemplazando el archivo DLL por uno manipulado, es posible ejecutar programas arbitrarios con la autoridad de la cuenta de SYSTEM. Los productos y versiones afectados son los siguientes: CENTUM CS 3000 R3.08.10 a R3.09.50 CENTUM VP R4.01.00 a R4.03.00, R5.01.00 a R5.04.20, R6.01.00 a R6.11.10.\"}]",
      "id": "CVE-2024-5650",
      "lastModified": "2024-11-21T09:48:05.557",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 6.0}]}",
      "published": "2024-06-17T07:15:41.647",
      "references": "[{\"url\": \"https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf\", \"source\": \"7168b535-132a-4efe-a076-338f829b2eb9\"}, {\"url\": \"https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-284\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-5650\",\"sourceIdentifier\":\"7168b535-132a-4efe-a076-338f829b2eb9\",\"published\":\"2024-06-17T07:15:41.647\",\"lastModified\":\"2024-11-21T09:48:05.557\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account.\\n\\nThe affected products and versions are as follows:\\nCENTUM CS 3000 R3.08.10 to R3.09.50\\nCENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado una vulnerabilidad de secuestro de DLL en CENTUM CAMS Log server provided by Yokogawa Electric Corporation. Si un atacante de alguna manera puede ingresar a una computadora que instal\u00f3 el producto afectado o acceder a una carpeta compartida, reemplazando el archivo DLL por uno manipulado, es posible ejecutar programas arbitrarios con la autoridad de la cuenta de SYSTEM. Los productos y versiones afectados son los siguientes: CENTUM CS 3000 R3.08.10 a R3.09.50 CENTUM VP R4.01.00 a R4.03.00, R5.01.00 a R5.04.20, R6.01.00 a R6.11.10.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"7168b535-132a-4efe-a076-338f829b2eb9\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"7168b535-132a-4efe-a076-338f829b2eb9\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"references\":[{\"url\":\"https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf\",\"source\":\"7168b535-132a-4efe-a076-338f829b2eb9\"},{\"url\":\"https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:18:06.883Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-5650\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-17T13:51:30.100377Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:yokogawa:centum_cs_3000:r3.08.10:*:*:*:*:*:*:*\"], \"vendor\": \"yokogawa\", \"product\": \"centum_cs_3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"r3.08.10\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"r3.09.50\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:yokogawa:centum_vp:r4.01.00:*:*:*:-:*:*:*\"], \"vendor\": \"yokogawa\", \"product\": \"centum_vp\", \"versions\": [{\"status\": \"affected\", \"version\": \"r4.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"f4.03.00\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:yokogawa:centum_vp:r6.01.00:*:*:*:*:*:*:*\"], \"vendor\": \"yokogawa\", \"product\": \"centum_vp\", \"versions\": [{\"status\": \"affected\", \"version\": \"r5.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"r5.04.20\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:yokogawa:centum_vp:r6.01.00:*:*:*:*:*:*:*\"], \"vendor\": \"yokogawa\", \"product\": \"centum_vp\", \"versions\": [{\"status\": \"affected\", \"version\": \"r6.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"r6.11.10\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-17T13:51:11.367Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Yokogawa Electric Corporation\", \"product\": \"CENTUM CS 3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"R3.08.10\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R3.09.50\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Yokogawa Electric Corporation\", \"product\": \"CENTUM VP\", \"versions\": [{\"status\": \"affected\", \"version\": \"R4.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R4.03.00\"}, {\"status\": \"affected\", \"version\": \"R5.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R5.04.20\"}, {\"status\": \"affected\", \"version\": \"R6.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R6.11.10\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2024-06-17T03:00:00.000Z\", \"references\": [{\"url\": \"https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account.\\n\\nThe affected products and versions are as follows:\\nCENTUM CS 3000 R3.08.10 to R3.09.50\\nCENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account.\u003cbr\u003e\u003cbr\u003eThe affected products and versions are as follows:\u003cbr\u003eCENTUM CS 3000 R3.08.10 to R3.09.50\u003cbr\u003eCENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284\"}]}], \"providerMetadata\": {\"orgId\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"shortName\": \"YokogawaGroup\", \"dateUpdated\": \"2024-06-17T06:21:31.387Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-5650\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:18:06.883Z\", \"dateReserved\": \"2024-06-05T05:32:13.103Z\", \"assignerOrgId\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"datePublished\": \"2024-06-17T06:21:31.387Z\", \"assignerShortName\": \"YokogawaGroup\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…