CVE-2014-5208

Yokogawa Exaopc < 3.71.10 - Improper Access Control

Title source: rule

Description

BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.

Exploits (1)

metasploit WORKING POC
by Unknown · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb

Scores

EPSS 0.0846
EPSS Percentile 92.4%

Details

CWE
CWE-284
Status published
Products (18)
yokogawa/centum_cs_3000 r3.01
yokogawa/centum_cs_3000 r3.02
yokogawa/centum_cs_3000 r3.03
yokogawa/centum_cs_3000 r3.04
yokogawa/centum_cs_3000 r3.05
yokogawa/centum_cs_3000 r3.06
yokogawa/centum_cs_3000 r3.07
yokogawa/centum_cs_3000 r3.08
yokogawa/centum_cs_3000 r3.08.50
yokogawa/centum_cs_3000 r3.08.70
... and 8 more
Published Dec 22, 2014
Tracked Since Feb 18, 2026