OS command injection vulnerability exists in CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02, which may allow an attacker who can access the computer where the affected product is installed to execute an arbitrary OS command by altering a file generated using Graphic Builder.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU99204686/index.html | Third Party Advisory |
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/ | Vendor Advisory |
https://jvn.jp/vu/JVNVU99204686/index.html | Third Party Advisory |
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/vu/JVNVU99204686/index.html - Third Party Advisory | |
References | () https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/ - Vendor Advisory |
Information
Published : 2022-04-15 02:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27188
Mitre link : CVE-2022-27188
CVE.ORG link : CVE-2022-27188
JSON object : View
Products Affected
yokogawa
- centum_vp
- b\/m9000_vp
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')