Vulnerabilities > Yokogawa > Centum VP Firmware > High

DATE CVE VULNERABILITY TITLE RISK
2022-06-28 CVE-2022-30707 Unspecified vulnerability in Yokogawa products
Violation of secure design principles exists in the communication of CAMS for HIS.
low complexity
yokogawa
8.8
2022-03-11 CVE-2022-23402 Use of Hard-coded Credentials vulnerability in Yokogawa products
The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00
network
low complexity
yokogawa CWE-798
7.5
2020-08-05 CVE-2020-5609 Path Traversal vulnerability in Yokogawa products
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to create or overwrite arbitrary files and run arbitrary commands via unspecified vectors.
network
low complexity
yokogawa CWE-22
7.5
2020-08-05 CVE-2020-5608 Improper Authentication vulnerability in Yokogawa products
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered communication packets via unspecified vectors.
network
low complexity
yokogawa CWE-287
7.5