Vulnerability Details : CVE-2022-30707
Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration.
Vulnerability category: Information leak
Products affected by CVE-2022-30707
- cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:b\/m9000_vp:*:*:*:*:*:*:*:*
- Yokogawa » Centum Cs 3000 FirmwareVersions from including (>=) r3.08.10 and up to, including, (<=) r3.09.00cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*
- Yokogawa » Centum Vp FirmwareVersions from including (>=) r6.01.00 and up to, including, (<=) r6.09.00cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*
- Yokogawa » Centum Vp FirmwareVersions from including (>=) r4.01.00 and up to, including, (<=) r4.03.00cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*
- Yokogawa » Centum Vp FirmwareVersions from including (>=) r5.01.00 and up to, including, (<=) r5.04.20cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*
- Yokogawa » Centum Cs 3000 Entry Class FirmwareVersions from including (>=) r3.08.10 and up to, including, (<=) r3.09.00cpe:2.3:o:yokogawa:centum_cs_3000_entry_class_firmware:*:*:*:*:*:*:*:*
- Yokogawa » Centum Vp Entry Class FirmwareVersions from including (>=) r6.01.00 and up to, including, (<=) r6.09.00cpe:2.3:o:yokogawa:centum_vp_entry_class_firmware:*:*:*:*:*:*:*:*
- Yokogawa » Centum Vp Entry Class FirmwareVersions from including (>=) r5.01.00 and up to, including, (<=) r5.04.20cpe:2.3:o:yokogawa:centum_vp_entry_class_firmware:*:*:*:*:*:*:*:*
- Yokogawa » Centum Vp Entry Class FirmwareVersions from including (>=) r4.01.00 and up to, including, (<=) r4.03.00cpe:2.3:o:yokogawa:centum_vp_entry_class_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:b\/m9000cs:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30707
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-30707
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | AV:A/AC:M/Au:N/C:P/I:P/A:P |
5.5
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2022-30707
-
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02
Yokogawa CAMS for HIS | CISAThird Party Advisory;US Government Resource
-
https://jvn.jp/vu/JVNVU92819891/index.html
JVNVU#92819891: CAMS for HISの通信の設計に不備Third Party Advisory;VDB Entry
-
https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf
Vendor Advisory
-
https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf
Vendor Advisory
Jump to