CVE-2014-5208
Yokogawa Exaopc < 3.71.10 - Improper Access Control
Title source: ruleDescription
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.
Exploits (1)
metasploit
WORKING POC
by Unknown · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb
References (3)
Scores
EPSS
0.0846
EPSS Percentile
92.4%
Details
CWE
CWE-284
Status
published
Products (18)
yokogawa/centum_cs_3000
r3.01
yokogawa/centum_cs_3000
r3.02
yokogawa/centum_cs_3000
r3.03
yokogawa/centum_cs_3000
r3.04
yokogawa/centum_cs_3000
r3.05
yokogawa/centum_cs_3000
r3.06
yokogawa/centum_cs_3000
r3.07
yokogawa/centum_cs_3000
r3.08
yokogawa/centum_cs_3000
r3.08.50
yokogawa/centum_cs_3000
r3.08.70
... and 8 more
Published
Dec 22, 2014
Tracked Since
Feb 18, 2026