CVE-2022-30707
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration.
Se presenta una violación de los principios de diseño seguro en la comunicación de CAMS para HIS. Los productos y versiones afectados son: la serie CENTUM en la que está instalado el LHS4800 (CENTUM CS 3000 y CENTUM CS 3000 Small R3.08.10 a R3.09.00), la serie CENTUM en la que se usa la función CAMS (CENTUM VP, CENTUM VP Small y CENTUM VP Basic R4.01.00 a R4.03. 00), la serie CENTUM independientemente del uso de la función CAMS (CENTUM VP, CENTUM VP Small y CENTUM VP Basic R5.01.00 a R5.04.20 y R6.01.00 a R6.09.00), Exaopc R3. 72.00 a R3.80.00 (sólo si está instalado el NTPF100-S6 "Para CENTUM soporte VP CAMS para HIS"), B/M9000 CS R5.04.01 a R5.05.01, y B/M9000 VP R6.01.01 a R8.03.01). Si un atacante adyacente logra comprometer un ordenador usando el software CAMS for HIS, puede usar las credenciales de la máquina comprometida para acceder a los datos de otra máquina que use el software CAMS for HIS. Esto puede conllevar a una inhabilitación de las funciones del software CAMS for HIS en cualquier máquina afectada, o la divulgación/alteración de información
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-06 CVE Reserved
- 2022-06-28 CVE Published
- 2024-08-03 CVE Updated
- 2025-01-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://jvn.jp/vu/JVNVU92819891/index.html | Third Party Advisory | |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf | 2023-08-08 | |
https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf | 2023-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Yokogawa Search vendor "Yokogawa" | Centum Cs 3000 Firmware Search vendor "Yokogawa" for product "Centum Cs 3000 Firmware" | >= r3.08.10 <= r3.09.00 Search vendor "Yokogawa" for product "Centum Cs 3000 Firmware" and version " >= r3.08.10 <= r3.09.00" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Cs 3000 Search vendor "Yokogawa" for product "Centum Cs 3000" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Centum Cs 3000 Entry Class Firmware Search vendor "Yokogawa" for product "Centum Cs 3000 Entry Class Firmware" | >= r3.08.10 <= r3.09.00 Search vendor "Yokogawa" for product "Centum Cs 3000 Entry Class Firmware" and version " >= r3.08.10 <= r3.09.00" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Cs 3000 Entry Class Search vendor "Yokogawa" for product "Centum Cs 3000 Entry Class" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Centum Vp Firmware Search vendor "Yokogawa" for product "Centum Vp Firmware" | >= r4.01.00 <= r4.03.00 Search vendor "Yokogawa" for product "Centum Vp Firmware" and version " >= r4.01.00 <= r4.03.00" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Vp Search vendor "Yokogawa" for product "Centum Vp" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Centum Vp Firmware Search vendor "Yokogawa" for product "Centum Vp Firmware" | >= r5.01.00 <= r5.04.20 Search vendor "Yokogawa" for product "Centum Vp Firmware" and version " >= r5.01.00 <= r5.04.20" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Vp Search vendor "Yokogawa" for product "Centum Vp" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Centum Vp Firmware Search vendor "Yokogawa" for product "Centum Vp Firmware" | >= r6.01.00 <= r6.09.00 Search vendor "Yokogawa" for product "Centum Vp Firmware" and version " >= r6.01.00 <= r6.09.00" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Vp Search vendor "Yokogawa" for product "Centum Vp" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Centum Vp Entry Class Firmware Search vendor "Yokogawa" for product "Centum Vp Entry Class Firmware" | >= r4.01.00 <= r4.03.00 Search vendor "Yokogawa" for product "Centum Vp Entry Class Firmware" and version " >= r4.01.00 <= r4.03.00" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Vp Entry Class Search vendor "Yokogawa" for product "Centum Vp Entry Class" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Centum Vp Entry Class Firmware Search vendor "Yokogawa" for product "Centum Vp Entry Class Firmware" | >= r5.01.00 <= r5.04.20 Search vendor "Yokogawa" for product "Centum Vp Entry Class Firmware" and version " >= r5.01.00 <= r5.04.20" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Vp Entry Class Search vendor "Yokogawa" for product "Centum Vp Entry Class" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Centum Vp Entry Class Firmware Search vendor "Yokogawa" for product "Centum Vp Entry Class Firmware" | >= r6.01.00 <= r6.09.00 Search vendor "Yokogawa" for product "Centum Vp Entry Class Firmware" and version " >= r6.01.00 <= r6.09.00" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Centum Vp Entry Class Search vendor "Yokogawa" for product "Centum Vp Entry Class" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Exaopc Search vendor "Yokogawa" for product "Exaopc" | >= r3.72.00 <= r3.80.00 Search vendor "Yokogawa" for product "Exaopc" and version " >= r3.72.00 <= r3.80.00" | - |
Affected
| ||||||
Yokogawa Search vendor "Yokogawa" | B\/m9000 Vp Search vendor "Yokogawa" for product "B\/m9000 Vp" | >= r6.01.01 <= r8.03.01 Search vendor "Yokogawa" for product "B\/m9000 Vp" and version " >= r6.01.01 <= r8.03.01" | - |
Affected
| ||||||
Yokogawa Search vendor "Yokogawa" | B\/m9000cs Search vendor "Yokogawa" for product "B\/m9000cs" | >= r5.04.01 <= r5.05.01 Search vendor "Yokogawa" for product "B\/m9000cs" and version " >= r5.04.01 <= r5.05.01" | - |
Affected
|