Vulnerability Details : CVE-2022-30997
Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.
Products affected by CVE-2022-30997
- cpe:2.3:o:yokogawa:stardom_fcj_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:yokogawa:stardom_fcn_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30997
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-30997
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
6.3
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H |
0.4
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-01 |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2022-30997
-
The product contains hard-coded credentials, such as a password or cryptographic key.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-30997
-
https://web-material3.yokogawa.com/1/32885/files/YSAR-22-0007-E.pdf
Mitigation;Vendor Advisory
-
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-01
Yokogawa STARDOM | CISAMitigation;Third Party Advisory;US Government Resource
-
https://jvn.jp/vu/JVNVU95452299/index.html
JVNVU#95452299: YOKOGAWA STARDOMのコントローラーに複数の脆弱性Mitigation;Third Party Advisory;VDB Entry
-
https://web-material3.yokogawa.com/19/32885/files/YSAR-22-0007-J.pdf
Mitigation;Vendor Advisory
Jump to