CVE-2020-5608

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to bypass authentication and send manipulated communication packets to Yokogawa industrial control systems. Affected systems include CENTUM CS 3000, CENTUM VP, B/M9000CS, and B/M9000 VP across multiple versions. This affects industrial environments using these control systems.

💻 Affected Systems

Products:
  • CENTUM CS 3000
  • CENTUM CS 3000 Small
  • CENTUM VP
  • CENTUM VP Small
  • CENTUM VP Basic
  • B/M9000CS
  • B/M9000 VP
Versions: CENTUM CS 3000: R3.08.10 to R3.09.50; CENTUM VP: R4.01.00 to R6.07.00; B/M9000CS: R5.04.01 to R5.05.01; B/M9000 VP: R6.01.01 to R8.03.01
Operating Systems: Windows-based control systems
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configuration are vulnerable. Systems must be running the CAMS for HIS component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to manipulate industrial processes, cause physical damage, disrupt operations, or exfiltrate sensitive industrial data.

🟠

Likely Case

Unauthorized access to control systems allowing manipulation of process variables, configuration changes, or denial of service to critical industrial operations.

🟢

If Mitigated

Limited impact if systems are isolated in air-gapped networks with strict access controls, though authentication bypass remains possible within the network.

🌐 Internet-Facing: HIGH - Systems exposed to internet are directly vulnerable to unauthenticated remote attacks.
🏢 Internal Only: HIGH - Even internally, unauthenticated attackers on the network can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated remote exploitation via unspecified vectors, suggesting relatively straightforward exploitation once understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply security updates: CENTUM CS 3000: R3.09.60 or later; CENTUM VP: R6.08.00 or later; B/M9000CS: R5.06.00 or later; B/M9000 VP: R8.04.00 or later

Vendor Advisory: https://web-material3.yokogawa.com/1/29820/files/YSAR-20-0001-E.pdf

Restart Required: Yes

Instructions:

1. Download security updates from Yokogawa support portal. 2. Apply updates according to vendor documentation. 3. Restart affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems in dedicated industrial control network segments with strict firewall rules.

Access Control Lists

all

Implement strict network ACLs to limit communication to only authorized systems and ports.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy intrusion detection systems monitoring for anomalous communication patterns

🔍 How to Verify

Check if Vulnerable:

Check system version against affected ranges in vendor advisory. Verify CAMS for HIS component is installed.

Check Version:

Check version through Yokogawa system management interface or consult system documentation for version verification commands.

Verify Fix Applied:

Confirm system version is updated to patched versions listed in vendor advisory. Verify no authentication bypass occurs during testing.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful unauthorized access
  • Unusual communication patterns from unauthenticated sources
  • Configuration changes from unexpected sources

Network Indicators:

  • Unauthenticated communication packets to control system ports
  • Altered packet structures in control system communications
  • Traffic from unauthorized IP addresses to control systems

SIEM Query:

source_ip NOT IN authorized_list AND destination_port IN [control_system_ports] AND protocol=tcp

🔗 References

📤 Share & Export