ID

VAR-201902-0199


CVE

CVE-2019-5909


TITLE

Vulnerabilities with insufficient access restrictions for license manager services of multiple Yokogawa products

Trust: 0.8

sources: JVNDB: JVNDB-2019-001193

DESCRIPTION

Insufficient access restrictions for license manager services for multiple Yokogawa products (CWE-302) Vulnerabilities exist. This vulnerability information is provided by developers for the purpose of disseminating to product users. JPCERT/CC To report to JPCERT/CC By developers and the United States ICS-CERT And adjusted.License manager service operated by a remote third party PC , Any file may be created or overwritten in any location with the system authority to execute the service. Multiple Yokogawa Products are prone to an arbitrary file-upload vulnerability. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. The following Yokogawa products are vulnerable: CENTUM VP R5.01.00 through R6.06.00 CENTUM VP Entry Class R5.01.00 through R6.06.00 ProSafe-RS R3.01.00 through R4.04.00 PRM R4.01.00 through R4.02.00 B/M9000 VP R7.01.01 through R8.02.03. are all products of Japan's Yokogawa Electric (Yokogawa). ProSafe-RS is a safety instrumented system. License Manager Service is a license management service used in it. A security vulnerability exists in several Yokogawa products due to the program not properly restricting the upload of malicious files

Trust: 1.08

sources: JVNDB: JVNDB-2019-001193 // BID: 106772 // VULHUB: VHN-157344

AFFECTED PRODUCTS

vendor:yokogawamodel:centum vpscope:gteversion:r5.01.00

Trust: 1.0

vendor:yokogawamodel:b\/m 9000 vpscope:lteversion:r8.02.03

Trust: 1.0

vendor:yokogawamodel:prmscope:gteversion:r4.01.00

Trust: 1.0

vendor:yokogawamodel:prosafe-rsscope:gteversion:r3.01.00

Trust: 1.0

vendor:yokogawamodel:centum vpscope:lteversion:r6.06.00

Trust: 1.0

vendor:yokogawamodel:prmscope:lteversion:r4.02.00

Trust: 1.0

vendor:yokogawamodel:b\/m 9000 vpscope:gteversion:r7.01.01

Trust: 1.0

vendor:yokogawamodel:prosafe-rsscope:lteversion:r4.04.00

Trust: 1.0

vendor:yokogawa electricmodel:b/m9000 vpscope:lteversion:(r7.01.01 from r8.02.03 )

Trust: 0.8

vendor:yokogawa electricmodel:centum vpscope:lteversion:(r5.01.00 from r6.06.00 )

Trust: 0.8

vendor:yokogawa electricmodel:centum vp basicscope:lteversion:(r5.01.00 from r6.06.00 )

Trust: 0.8

vendor:yokogawa electricmodel:centum vp smallscope:lteversion:(r5.01.00 from r6.06.00 )

Trust: 0.8

vendor:yokogawa electricmodel:prmscope:lteversion:(r4.01.00 from r4.02.00 )

Trust: 0.8

vendor:yokogawa electricmodel:prosafe-rsscope:lteversion:(r3.01.00 from r4.04.00 )

Trust: 0.8

vendor:yokogawamodel:prosafe-rs r4.04.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:prosafe-rs r4.03.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:prosafe-rs r4.02.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:prosafe-rs r3.02.10scope: - version: -

Trust: 0.3

vendor:yokogawamodel:prosafe-rs r3.01.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:prm r4.02.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:prm r4.01.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r6.06.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r6.04.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r6.03.10scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r5.04.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r5.03.51scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r5.03.20scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r5.03.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r5.01.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp r6.06.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp r6.04.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp r6.03.10scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp r5.04.20scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp r5.04.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:centum vp r5.01.00scope: - version: -

Trust: 0.3

vendor:yokogawamodel:b/m9000 vp r8.02.03scope: - version: -

Trust: 0.3

vendor:yokogawamodel:b/m9000 vp r8.01.90scope: - version: -

Trust: 0.3

vendor:yokogawamodel:b/m9000 vp r8.01.01scope: - version: -

Trust: 0.3

vendor:yokogawamodel:b/m9000 vp r7.03.04scope: - version: -

Trust: 0.3

vendor:yokogawamodel:b/m9000 vp r7.03.01scope: - version: -

Trust: 0.3

vendor:yokogawamodel:b/m9000 vp r7.01.01scope: - version: -

Trust: 0.3

vendor:yokogawamodel:prosafe-rs r4.04.01scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:prosafe-rs r3.02.38scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:prm r4.02.01scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r6.06.03scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:centum vp entry class r5.04.c5scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:centum vp r6.06.03scope:neversion: -

Trust: 0.3

vendor:yokogawamodel:centum vp r5.04.c5scope:neversion: -

Trust: 0.3

sources: BID: 106772 // JVNDB: JVNDB-2019-001193 // NVD: CVE-2019-5909

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5909
value: CRITICAL

Trust: 1.0

JPCERT/CC: JVNDB-2019-001193
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201901-972
value: CRITICAL

Trust: 0.6

VULHUB: VHN-157344
value: HIGH

Trust: 0.1

VULMON: CVE-2019-5909
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-5909
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

JPCERT/CC: JVNDB-2019-001193
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-157344
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-5909
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

JPCERT/CC: JVNDB-2019-001193
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-157344 // VULMON: CVE-2019-5909 // JVNDB: JVNDB-2019-001193 // CNNVD: CNNVD-201901-972 // NVD: CVE-2019-5909

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.1

problemtype:CWE-302

Trust: 0.8

sources: VULHUB: VHN-157344 // JVNDB: JVNDB-2019-001193 // NVD: CVE-2019-5909

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-972

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201901-972

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001193

PATCH

title:YSAR-19-0001: 横河製品のライセンスマネージャーサービスにアクセス制御の脆弱性url:https://web-material3.yokogawa.com/19/20653/files/YSAR-19-0001-J.pdf

Trust: 0.8

title:Multiple Yokogawa Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89041

Trust: 0.6

sources: JVNDB: JVNDB-2019-001193 // CNNVD: CNNVD-201901-972

EXTERNAL IDS

db:NVDid:CVE-2019-5909

Trust: 2.9

db:JVNid:JVNVU99147082

Trust: 2.6

db:BIDid:106772

Trust: 2.1

db:ICS CERTid:ICSA-19-029-01

Trust: 1.2

db:JVNDBid:JVNDB-2019-001193

Trust: 0.8

db:CNNVDid:CNNVD-201901-972

Trust: 0.7

db:SEEBUGid:SSVID-98807

Trust: 0.1

db:VULHUBid:VHN-157344

Trust: 0.1

db:VULMONid:CVE-2019-5909

Trust: 0.1

sources: VULHUB: VHN-157344 // VULMON: CVE-2019-5909 // BID: 106772 // JVNDB: JVNDB-2019-001193 // CNNVD: CNNVD-201901-972 // NVD: CVE-2019-5909

REFERENCES

url:http://www.securityfocus.com/bid/106772

Trust: 2.5

url:https://web-material3.yokogawa.com/1/20653/files/ysar-19-0001-e.pdf

Trust: 2.1

url:http://jvn.jp/vu/jvnvu99147082/index.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-5909

Trust: 1.4

url:https://ics-cert.us-cert.gov/advisories/icsa-19-029-01

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5909

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99147082/

Trust: 0.8

url:http://www.yokogawa.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-157344 // VULMON: CVE-2019-5909 // BID: 106772 // JVNDB: JVNDB-2019-001193 // CNNVD: CNNVD-201901-972 // NVD: CVE-2019-5909

CREDITS

Kaspersky Lab,Segey Temnikov

Trust: 0.6

sources: CNNVD: CNNVD-201901-972

SOURCES

db:VULHUBid:VHN-157344
db:VULMONid:CVE-2019-5909
db:BIDid:106772
db:JVNDBid:JVNDB-2019-001193
db:CNNVDid:CNNVD-201901-972
db:NVDid:CVE-2019-5909

LAST UPDATE DATE

2024-11-23T22:33:59.232000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-157344date:2020-08-24T00:00:00
db:VULMONid:CVE-2019-5909date:2020-08-24T00:00:00
db:BIDid:106772date:2019-01-29T00:00:00
db:JVNDBid:JVNDB-2019-001193date:2019-01-28T00:00:00
db:CNNVDid:CNNVD-201901-972date:2020-08-25T00:00:00
db:NVDid:CVE-2019-5909date:2024-11-21T04:45:43.697

SOURCES RELEASE DATE

db:VULHUBid:VHN-157344date:2019-02-13T00:00:00
db:VULMONid:CVE-2019-5909date:2019-02-13T00:00:00
db:BIDid:106772date:2019-01-29T00:00:00
db:JVNDBid:JVNDB-2019-001193date:2019-01-28T00:00:00
db:CNNVDid:CNNVD-201901-972date:2019-01-30T00:00:00
db:NVDid:CVE-2019-5909date:2019-02-13T18:29:00.747