Lucene search

K
cve[email protected]CVE-2014-5208
HistoryDec 22, 2014 - 5:59 p.m.

CVE-2014-5208

2014-12-2217:59:00
CWE-284
web.nvd.nist.gov
23
cve-2014-5208
yokogawa centum
batch management
authentication bypass
remote attack
file read
file write
information disclosure

6.3 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.254 Low

EPSS

Percentile

96.7%

BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.

Affected configurations

NVD
Node
yokogawaexaopcRange3.71.10
AND
yokogawaexaopcMatch-
Node
yokogawacentum_cs_3000Matchr3.01
OR
yokogawacentum_cs_3000Matchr3.02
OR
yokogawacentum_cs_3000Matchr3.03
OR
yokogawacentum_cs_3000Matchr3.04
OR
yokogawacentum_cs_3000Matchr3.05
OR
yokogawacentum_cs_3000Matchr3.06
OR
yokogawacentum_cs_3000Matchr3.07
OR
yokogawacentum_cs_3000Matchr3.08
OR
yokogawacentum_cs_3000Matchr3.08.50
OR
yokogawacentum_cs_3000Matchr3.08.70
OR
yokogawacentum_cs_3000Matchr3.09
OR
yokogawacentum_cs_3000Matchr3.09.50
AND
yokogawacentum_cs_3000Match-
Node
yokogawacentum_vpRanger4.03.00
OR
yokogawacentum_vpMatchr5.01.00
OR
yokogawacentum_vpMatchr5.01.20
OR
yokogawacentum_vpMatchr5.02.00
OR
yokogawacentum_vpMatchr5.03.00
AND
yokogawacentum_vpMatch-

6.3 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.254 Low

EPSS

Percentile

96.7%