BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.
References
Link | Resource |
---|---|
http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0003E.pdf | Vendor Advisory |
https://community.rapid7.com/community/metasploit/blog/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access | Exploit |
https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A | Third Party Advisory US Government Resource |
http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0003E.pdf | Vendor Advisory |
https://community.rapid7.com/community/metasploit/blog/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access | Exploit |
https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0003E.pdf - Vendor Advisory | |
References | () https://community.rapid7.com/community/metasploit/blog/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access - Exploit | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A - Third Party Advisory, US Government Resource |
Information
Published : 2014-12-22 17:59
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5208
Mitre link : CVE-2014-5208
CVE.ORG link : CVE-2014-5208
JSON object : View
Products Affected
yokogawa
- centum_cs_3000
- centum_vp
- exaopc
CWE
CWE-284
Improper Access Control