CVE-2022-22141

7.8 HIGH

📋 TL;DR

This vulnerability in Yokogawa's Long-term Data Archive Package service creates named pipes with improper access control lists (ACLs), allowing unauthorized users to potentially read, write, or delete data. It affects CENTUM CS 3000, CENTUM VP, and Exaopc industrial control systems from specific version ranges.

💻 Affected Systems

Products:
  • CENTUM CS 3000
  • CENTUM VP
  • Exaopc
Versions: CENTUM CS 3000: R3.08.10 to R3.09.00; CENTUM VP: R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.08.00; Exaopc: R3.72.00 to R3.79.00
Operating Systems: Windows-based industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Long-term Data Archive Package service enabled. Industrial control systems typically run on specialized Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could read sensitive industrial process data, modify or delete archived data, or potentially execute arbitrary code through named pipe manipulation, leading to operational disruption or safety incidents.

🟠

Likely Case

Unauthorized users within the same network could access archived industrial data they shouldn't have permissions to view, potentially exposing sensitive operational information.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to authorized users who might gain unintended data access beyond their normal permissions.

🌐 Internet-Facing: LOW - Industrial control systems should never be directly internet-facing. If exposed, risk increases significantly.
🏢 Internal Only: MEDIUM - Requires network access to affected systems, but within industrial networks could allow unauthorized data access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to affected systems and knowledge of named pipe manipulation. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply security patches from Yokogawa. Specific versions: CENTUM CS 3000: R3.09.01+, CENTUM VP: R4.03.01+, R5.04.30+, R6.08.01+, Exaopc: R3.79.01+

Vendor Advisory: https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf

Restart Required: Yes

Instructions:

1. Download security patch from Yokogawa support portal. 2. Apply patch following Yokogawa's installation instructions. 3. Restart affected services/systems. 4. Verify patch application through version checking.

🔧 Temporary Workarounds

Disable Long-term Data Archive Service

windows

Temporarily disable the vulnerable service if not required for operations

sc stop "Yokogawa Long-term Data Archive"
sc config "Yokogawa Long-term Data Archive" start= disabled

Restrict Named Pipe Access

windows

Manually adjust ACLs on vulnerable named pipes

icacls "\\.\pipe\YokogawaLTDAPipe*" /deny Everyone:(R,W)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from unauthorized users
  • Apply principle of least privilege to user accounts accessing affected systems

🔍 How to Verify

Check if Vulnerable:

Check if Long-term Data Archive service is running and system version falls within affected ranges. Use: sc query "Yokogawa Long-term Data Archive"

Check Version:

Check Yokogawa system information through control panel or product-specific version commands

Verify Fix Applied:

Verify service version is patched (R3.09.01+, R4.03.01+, R5.04.30+, R6.08.01+, R3.79.01+) and check named pipe permissions

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Yokogawa named pipes
  • Service start/stop events for Long-term Data Archive service
  • Permission modification events on named pipes

Network Indicators:

  • Unexpected connections to Yokogawa service ports
  • Named pipe enumeration attempts from unauthorized hosts

SIEM Query:

EventID=4688 AND ProcessName LIKE '%Yokogawa%' AND CommandLine LIKE '%pipe%' OR EventID=5145 AND ObjectName LIKE '%Yokogawa%pipe%'

🔗 References

📤 Share & Export