CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-27872 CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-08-03T03:21:49.121Z

Reserved: 2022-02-03T00:00:00

Link: CVE-2022-22729

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-11T09:15:11.683

Modified: 2024-11-21T06:47:20.277

Link: CVE-2022-22729

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.