Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-17900 : What You Need to Know

Learn about CVE-2018-17900 affecting Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500. Find out the impact, affected systems, exploitation, and mitigation steps.

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, and all versions prior to R4.10 have a vulnerability that could allow unauthorized access to login credentials.

Understanding CVE-2018-17900

This CVE involves a flaw in the web application of Yokogawa STARDOM Controllers that inadequately protects login credentials, potentially enabling unauthorized access to the controllers.

What is CVE-2018-17900?

The vulnerability in Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, and versions prior to R4.10 allows unauthorized individuals to obtain login credentials for remote access to the controllers.

The Impact of CVE-2018-17900

The vulnerability could lead to unauthorized access to critical infrastructure systems, compromising their integrity and confidentiality.

Technical Details of CVE-2018-17900

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, and versions prior to R4.10 are affected by this vulnerability.

Vulnerability Description

The flaw in the web application results in insufficient protection of login credentials, potentially granting unauthorized access to the controllers.

Affected Systems and Versions

        Product: STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500
        Vendor: Yokogawa
        Versions: All versions R4.10 and prior

Exploitation Mechanism

Unauthorized individuals could exploit this vulnerability to obtain the credentials required for remote access to the controllers.

Mitigation and Prevention

Immediate Steps to Take:

        Implement network segmentation to restrict access to critical systems.
        Change default passwords and enforce strong password policies.
        Monitor network traffic for any unauthorized access attempts. Long-Term Security Practices:
        Regularly update and patch the controllers to address security vulnerabilities.
        Conduct security training for personnel to raise awareness of cybersecurity best practices.
        Utilize multi-factor authentication to enhance login security.
        Employ intrusion detection systems to detect and respond to unauthorized access attempts.
        Collaborate with cybersecurity experts to assess and enhance the overall security posture.

Patching and Updates

Ensure that the controllers are updated with the latest firmware patches provided by Yokogawa to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now