CVE-2014-5208

BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*
cpe:2.3:h:yokogawa:exaopc:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_cs_3000:r3.09.50:*:*:*:*:*:*:*
cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_vp:r5.01.00:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_vp:r5.01.20:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_vp:r5.02.00:*:*:*:*:*:*:*
cpe:2.3:a:yokogawa:centum_vp:r5.03.00:*:*:*:*:*:*:*
cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:11

Type Values Removed Values Added
References () http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0003E.pdf - Vendor Advisory () http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0003E.pdf - Vendor Advisory
References () https://community.rapid7.com/community/metasploit/blog/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access - Exploit () https://community.rapid7.com/community/metasploit/blog/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access - Exploit
References () https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A - Third Party Advisory, US Government Resource

Information

Published : 2014-12-22 17:59

Updated : 2024-11-21 02:11


NVD link : CVE-2014-5208

Mitre link : CVE-2014-5208

CVE.ORG link : CVE-2014-5208


JSON object : View

Products Affected

yokogawa

  • centum_cs_3000
  • centum_vp
  • exaopc
CWE
CWE-284

Improper Access Control