Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m6xr-cgmm-vx52

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.

Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.

EPSS

Процентиль: 91%
0.0681
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.

CVSS3: 9.8
fstec
больше 7 лет назад

Уязвимость микропрограммного обеспечения программируемых логических контроллеров STARDOM FCJ, FCN-100, FCN-RTU, FCN-500, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 91%
0.0681
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-798