DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account.
The affected products and versions are as follows:
CENTUM CS 3000 R3.08.10 to R3.09.50
CENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.
References
Configurations
No configuration.
History
21 Nov 2024, 09:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://web-material3.yokogawa.com/1/36044/files/YSAR-24-0002-E.pdf - |
17 Jun 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Jun 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-17 07:15
Updated : 2024-11-21 09:48
NVD link : CVE-2024-5650
Mitre link : CVE-2024-5650
CVE.ORG link : CVE-2024-5650
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control