U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-26593

Change History

Initial Analysis by NIST 4/20/2023 11:47:41 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:yokogawa:b\/m9000_vp:*:*:*:*:*:*:*:* versions from (including) r6.01.01 up to (including) r7.04.51
     *cpe:2.3:a:yokogawa:b\/m9000_vp:*:*:*:*:*:*:*:* versions from (including) r8.01.01
     *cpe:2.3:a:yokogawa:b\/m9000cs:*:*:*:*:*:*:*:* versions from (including) r5.04.01 up to (including) r5.05.01
     *cpe:2.3:a:yokogawa:centum_cs_1000:*:*:*:*:*:*:*:* versions from (including) r2.01.00 up to (including) r3.09.50
     *cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:* versions from (including) r2.01.00 up to (including) r3.09.50
     *cpe:2.3:a:yokogawa:centum_cs_3000_entry_class:*:*:*:*:*:*:*:* versions from (including) r2.01.00 up to (including) r3.09.50
     *cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:* versions from (including) r4.01.00 up to (including) r4.03.00
     *cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:* versions from (including) r5.01.00 up to (including) r5.04.20
     *cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:* versions from (including) r6.01.00
     *cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:* versions from (including) r4.01.00 up to (including) r4.02.00
     *cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:* versions from (including) r5.01.00 up to (including) r5.04.20
     *cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:* versions from (including) r6.01.00
     *cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:* versions from (including) r1.01.00 up to (including) r1.20.00
     *cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:* versions from (including) r2.01.00 up to (including) r2.10.00
     *cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:* versions from (including) r3.01.00
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-312
Changed Reference Type
https://jvn.jp/en/vu/JVNVU98775218/ No Types Assigned
https://jvn.jp/en/vu/JVNVU98775218/ Third Party Advisory
Changed Reference Type
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/ No Types Assigned
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/ Vendor Advisory