CVE-2025-1863

April 18, 2025, 6:15 a.m.

9.8
Critical

Description

Insecure default settings have been found in recorder products provided by Yokogawa Electric Corporation. The default setting of the authentication function is disabled on the affected products. Therefore, when connected to a network with default settings, anyone can access all functions related to settings and operations. As a result, an attacker can illegally manipulate and configure important data such as measured values and settings. This issue affects GX10 / GX20 / GP10 / GP20 Paperless Recorders: R5.04.01 or earlier; GM Data Acquisition System: R5.05.01 or earlier; DX1000 / DX2000 / DX1000N Paperless Recorders: R4.21 or earlier; FX1000 Paperless Recorders: R1.31 or earlier; μR10000 / μR20000 Chart Recorders: R1.51 or earlier; MW100 Data Acquisition Units: All versions; DX1000T / DX2000T Paperless Recorders: All versions; CX1000 / CX2000 Paperless Recorders: All versions.

Product(s) Impacted

Vendor Product Versions
Yokogawa
  • Gx10
  • Gx20
  • Gp10
  • Gp20
  • Gm Data Acquisition System
  • Dx1000
  • Dx2000
  • Dx1000n
  • Fx1000
  • Ur10000
  • Ur20000
  • Mw100
  • Dx1000t
  • Dx2000t
  • Cx1000
  • Cx2000
  • *
  • *
  • *
  • *
  • <5.05.01
  • <4.21
  • <4.21
  • <4.21
  • <1.31
  • <1.51
  • <1.51
  • *
  • *
  • *
  • *
  • *

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-1188
Initialization of a Resource with an Insecure Default
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a yokogawa gx10 / / / / / / / /
a yokogawa gx20 / / / / / / / /
a yokogawa gp10 / / / / / / / /
a yokogawa gp20 / / / / / / / /
a yokogawa gm_data_acquisition_system <5.05.01 / / / / / / /
a yokogawa dx1000 <4.21 / / / / / / /
a yokogawa dx2000 <4.21 / / / / / / /
a yokogawa dx1000n <4.21 / / / / / / /
a yokogawa fx1000 <1.31 / / / / / / /
a yokogawa ur10000 <1.51 / / / / / / /
a yokogawa ur20000 <1.51 / / / / / / /
a yokogawa mw100 / / / / / / / /
a yokogawa dx1000t / / / / / / / /
a yokogawa dx2000t / / / / / / / /
a yokogawa cx1000 / / / / / / / /
a yokogawa cx2000 / / / / / / / /

CVSS Score

9.8 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: April 18, 2025, 6:15 a.m.
Last Modified: April 18, 2025, 6:15 a.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

7168b535-132a-4efe-a076-338f829b2eb9

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.