Yokogawa STARDOM Controllers < R4.02 Hardcoded Credentials

critical Nessus Network Monitor Plugin ID 720135

Synopsis

Yokogawa STARDOM controllers utilize hard-coded credentials.

Description

Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

https://ics-cert.us-cert.gov/advisories/ICSA-18-151-03,http://www.securityfocus.com/bid/104376,https://web-material3.yokogawa.com/1/6712/details/YSAR-18-0004-E.pdf

Plugin Details

Severity: Critical

ID: 720135

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 5/31/2018

Vulnerability Publication Date: 5/31/2018

Reference Information

CVE: CVE-2018-10592

BID: 104376