Yokogawa’s latest release should handle an unrestricted upload of files with dangerous type vulnerability in its License Manager Service, according to a report with NCCIC.

Successful exploitation of this vulnerability, which Kaspersky Lab reported to Yokogawa, could allow an attacker to remotely upload files, allowing execution of arbitrary code.

AVEVA Fixes Wonderware System Platform Hole
Mitsubishi Fixes MELSEC-Q Series PLCs
BD has Mitigation Plan for FACSLyric Hole
Stryker Updates Medical Bed Software

The following equipment and versions utilizing the Yokogawa License Manager Service suffer from the remotely exploitable vulnerability:
• CENTUM VP (R5.01.00 – R6.06.00)
• CENTUM VP Entry Class (R5.01.00 – R6.06.00)
• ProSafe-RS (R3.01.00 – R4.04.00)
• PRM (R4.01.00 – R4.02.00)
• B/M9000 VP (R7.01.01 – R8.02.03)

In the vulnerability, multiple Yokogawa products utilize a service intended to verify the validity of licensed products being utilized. The service running on affected products does not properly restrict the upload of potentially malicious files, which could result in execution of arbitrary code.

Schneider Bold

CVE-2019-5909 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.1.

The products see use mainly in the critical manufacturing, energy, and food and agriculture sectors. They also see action on a global basis.

Yokogawa recommends users of affected devices and versions update to the latest available release. Details about the products, affected revisions, and suggested mitigations are available in the Yokogawa Security Advisory Report “YSAR-198-0001: Vulnerability of access control in License Manager Service of Yokogawa products.” Click here to view the advisory.

For questions related to this report and details regarding how to update to the newest revision, visit the Yokogawa security website (registration required).

Pin It on Pinterest

Share This