Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify information. This attack can be executed only during maintenance work.
References
Link | Resource |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-151-03 | Third Party Advisory US Government Resource |
https://web-material3.yokogawa.com/YSAR-18-0007-E.pdf | Vendor Advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-18-151-03 | Third Party Advisory US Government Resource |
https://web-material3.yokogawa.com/YSAR-18-0007-E.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-151-03 - Third Party Advisory, US Government Resource | |
References | () https://web-material3.yokogawa.com/YSAR-18-0007-E.pdf - Vendor Advisory |
Information
Published : 2018-10-12 14:29
Updated : 2024-11-21 03:55
NVD link : CVE-2018-17896
Mitre link : CVE-2018-17896
CVE.ORG link : CVE-2018-17896
JSON object : View
Products Affected
yokogawa
- fcn-500
- fcn-rtu_firmware
- fcn-rtu
- fcn-500_firmware
- fcj
- fcn-100_firmware
- fcj_firmware
- fcn-100
CWE
CWE-798
Use of Hard-coded Credentials