Yokogawa recommends an upgrade to new software to mitigate a hard-coded credentials vulnerability in its STARDOM Controllers, according to a report with NCCIC.
Successful exploitation of this remotely exploitable vulnerability, discovered by VDLab of Venustech and Dongfang Electric Corporation (DEC), could allow an attacker to gain access to the affected device, which could result in remote code execution.
Yokogawa reports the vulnerability affects the following STARDOM Controller products:
• FCJ (R4.02 and prior)
• FCN-100 (R4.02 and prior)
• FCN-RTU (R4.02 and prior)
• FCN-500 (R4.02 and prior)
In the vulnerability, the affected controllers utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.
CVE-2018-10592 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.
The products see use in the critical manufacturing, energy, and food and agriculture sectors. They also see action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Yokogawa recommended users upgrade the FCN/FCJ software to Version R4.10 or later and reported the vulnerability is remediated in that version. Yokogawa suggests all users introduce appropriate security measures not only for the vulnerability identified but also to the overall system.
Yokogawa recommends users with questions related to this report and information on obtaining the updates, utilize the product inquiry contact details.
Click here for Yokogawa’s Security Advisory Report, YSAR-18-0004: Vulnerability of hardcoded password in STARDOM controllers, and other Yokogawa security reports.