There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, andfrom R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
References
Link | Resource |
---|---|
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | Vendor Advisory |
https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
21 Nov 2024, 06:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf - Vendor Advisory |
Information
Published : 2022-03-11 09:15
Updated : 2024-11-21 06:44
NVD link : CVE-2022-21177
Mitre link : CVE-2022-21177
CVE.ORG link : CVE-2022-21177
JSON object : View
Products Affected
yokogawa
- centum_vp
- centum_vp_firmware
- centum_cs_3000_entry_firmware
- centum_cs_3000
- centum_cs_3000_firmware
- centum_vp_entry_firmware
- centum_cs_3000_entry
- centum_vp_entry
- exaopc