Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU92819891/index.html | Third Party Advisory VDB Entry |
https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf | Vendor Advisory |
https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf | Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
14 Jul 2022, 16:40
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02 - Third Party Advisory, US Government Resource | |
References | (MISC) https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf - Vendor Advisory | |
References | (MISC) https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf - Vendor Advisory | |
References | (MISC) https://jvn.jp/vu/JVNVU92819891/index.html - Third Party Advisory, VDB Entry | |
First Time |
Yokogawa centum Vp
Yokogawa centum Cs 3000 Entry Class Yokogawa b\/m9000 Vp Yokogawa b\/m9000cs Yokogawa centum Cs 3000 Entry Class Firmware Yokogawa centum Cs 3000 Yokogawa centum Vp Entry Class Firmware Yokogawa exaopc Yokogawa Yokogawa centum Vp Entry Class Yokogawa centum Cs 3000 Firmware Yokogawa centum Vp Firmware |
|
CVSS |
v2 : v3 : |
v2 : 5.4
v3 : 8.8 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:yokogawa:b\/m9000cs:*:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_cs_3000_entry_class_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_vp_entry_class_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:yokogawa:b\/m9000_vp:*:*:*:*:*:*:*:* |
28 Jun 2022, 13:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-28 13:15
Updated : 2023-12-10 14:22
NVD link : CVE-2022-30707
Mitre link : CVE-2022-30707
CVE.ORG link : CVE-2022-30707
JSON object : View
Products Affected
yokogawa
- centum_cs_3000
- centum_vp
- b\/m9000cs
- centum_cs_3000_entry_class_firmware
- centum_vp_entry_class
- b\/m9000_vp
- exaopc
- centum_cs_3000_entry_class
- centum_vp_entry_class_firmware
- centum_cs_3000_firmware
- centum_vp_firmware
CWE