All the vulnerabilites related to Yokogawa - Field Wireless Device OPC Server
var-202002-0866
Vulnerability from variot
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet. Provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product's communication capabilities. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product's communication capabilities. * * Vulnerability that stops communication functions by receiving specially crafted packets (CVE-2015-5626) * * Vulnerability that could cause a process to stop by receiving a specially crafted packet (CVE-2015-5627) * * Vulnerability that allows arbitrary code to be executed by receiving specially crafted packets (CVE-2015-5628) For details, please check the information provided by the product developer.By receiving a specially crafted communication frame, the communication function and the process that has the communication function may be stopped, or arbitrary code may be executed with the authority of the system that executes the process. According to product developers, this vulnerability could be exploited if the network of the entire system is properly managed, such as the network to which the affected product is connected is blocked from other networks. It is said that it is low. Yokogawa Japan Yokogawa Electric Corporation is a leader in measurement, industrial automation control, and information systems. A stack buffer overflow vulnerability exists in multiple Yokogawa products. The attacker sends a constructed packet to exploit the vulnerability to cause network communication to become unresponsive. Successful exploits may allow an attacker to execute arbitrary code or to cause a denial-of-service condition. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. Yokogawa CENTUM CS, etc. are all products of Japan's Yokogawa Electric (Yokogawa) company. Yokogawa CENTUM CS and CENTUM VP are large-scale production control systems. Exaopc is an OPC data access server
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0866", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "prosafe-rs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.02.10" }, { "model": "exaplog", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.40.00" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "field wireless device opc server", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.01.02" }, { "model": "exaquantum", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.85.00" }, { "model": "b\\/m9000 vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r7.03.04" }, { "model": "stardom opc server", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.40" }, { "model": "centum cs 3000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "centum vp entry", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "exapilot", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.96.10" }, { "model": "fieldmate", "scope": "eq", "trust": 1.0, "vendor": "yokogawa", "version": "r1.02" }, { "model": "exaopc", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.72.00" }, { "model": "centum cs 3000 entry", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "exarqe", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.20" }, { "model": "plant resource manager", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.12.00" }, { "model": "exasmoc", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.20" }, { "model": "exaquantum\\/batch", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.50.30" }, { "model": "centum cs 1000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.08.70" }, { "model": "versatile data server software", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r7.30.01" }, { "model": "b\\/m9000cs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.05.01" }, { "model": "fieldmate", "scope": "eq", "trust": 1.0, "vendor": "yokogawa", "version": "r1.01" }, { "model": "scada software \\", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r10.01" }, { "model": "exaopc \u003c=r3.72.00", "scope": null, "trust": 0.8, "vendor": "yokogawa", "version": null }, { "model": "centum centum cs", "scope": "eq", "trust": 0.8, "vendor": "yokogawa", "version": "1000" }, { "model": "b/m9000 vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r7.03.04 )" }, { "model": "b/m9000cs", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r5.05.01 )" }, { "model": "centum cs 1000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.08.70 )" }, { "model": "centum cs 3000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.09.50 )" }, { "model": "centum cs 3000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "small (r3.09.50 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r5.04.20 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "basic (r5.04.20 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "small (r5.04.20 )" }, { "model": "exaopc", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.72.00 )" }, { "model": "exapilot", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.96.10 )" }, { "model": "exaplog", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.40.00 )" }, { "model": "exaquantum", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r2.85.00 )" }, { "model": "exaquantum", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "/batch (r2.50.30 )" }, { "model": "exarqe", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r4.03.20 )" }, { "model": "exasmoc", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r4.03.20 )" }, { "model": "fast/tools", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r10.01 )" }, { "model": "fieldmate", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r1.01 and r1.02)" }, { "model": "prm", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.12.00 )" }, { "model": "prosafe-rs", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.02.10 )" }, { "model": "stardom", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "opc server for windows (r3.40 )" }, { "model": "stardom", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "vds (r7.30.01 )" }, { "model": "for field wireless opc server", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r2.01.02 )" }, { "model": "centum centum vp entry", "scope": null, "trust": 0.6, "vendor": "yokogawa", "version": null }, { "model": "centum centum vp", "scope": null, "trust": 0.6, "vendor": "yokogawa", "version": null }, { "model": "centum centum cs entry", "scope": "eq", "trust": 0.6, "vendor": "yokogawa", "version": "3000" }, { "model": "centum centum cs", "scope": "eq", "trust": 0.6, "vendor": "yokogawa", "version": "3000" }, { "model": "stardom vds r7.30.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "stardom opc server for windows r3.40", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r3.02.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r2.03.80", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r1.03.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prm r3.12.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prm r3.11.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fieldmate r1.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fieldmate r1.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "field wireless device opc server r2.01.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "field wireless device opc server r2.01.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.05-sp2", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.05", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.04", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.03", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r10.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exasmoc r4.03.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exarqe r4.03.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum/batch r2.50.30", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum/batch r2.50.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.85.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.80.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.50.30", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.02.50", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaplog r3.40.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exapilot r3.96.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exapilot r3.96.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.72.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.72.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.71.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3.72.00" }, { "model": "exaopc", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3.71.02" }, { "model": "centum vp entry r5.04.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r5.04.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r5.04.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r4.03.56", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r4.03.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum cs entry r3.09.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.09.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.09", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.70", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.07", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.06", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.05", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.04", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.03", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.02", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.01", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.70", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "1000" }, { "model": "b/m9000cs r5.05.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "b/m9000 vp r7.03.04", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "b/m9000 vp r7.03.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum centum vp entry", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "*" }, { "model": "centum centum vp", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "*" }, { "model": "centum centum cs entry", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "3000*" }, { "model": "centum centum cs", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "3000*" } ], "sources": [ { "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5627" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.08.70", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:prosafe-rs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.02.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:prosafe-rs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.72.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exapilot:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.96.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaplog:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.40.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaquantum:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.85.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaquantum\\/batch:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.50.30", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exarqe:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exasmoc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.20", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:field_wireless_device_opc_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.01.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:field_wireless_device_opc_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.12.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:scada_software_\\(fast\\/tools\\):*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r10.01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:versatile_data_server_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r7.30.01", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.05.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r7.03.04", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:fieldmate:r1.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:fieldmate:r1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:stardom_opc_server:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionEndIncluding": "r3.40", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:stardom_opc_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-5627" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "76709" } ], "trust": 0.3 }, "cve": "CVE-2015-5627", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2015-004852", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2015-05996", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "81266b0e-2351-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-83588", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-5627", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-5627", "trust": 1.0, "value": "CRITICAL" }, { "author": "IPA", "id": "JVNDB-2015-004852", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-05996", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201509-478", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-83588", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-5627", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "VULHUB", "id": "VHN-83588" }, { "db": "VULMON", "id": "CVE-2015-5627" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5627" }, { "db": "CNNVD", "id": "CNNVD-201509-478" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet. Provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product\u0027s communication capabilities. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product\u0027s communication capabilities. * * Vulnerability that stops communication functions by receiving specially crafted packets (CVE-2015-5626) * * Vulnerability that could cause a process to stop by receiving a specially crafted packet (CVE-2015-5627) * * Vulnerability that allows arbitrary code to be executed by receiving specially crafted packets (CVE-2015-5628) For details, please check the information provided by the product developer.By receiving a specially crafted communication frame, the communication function and the process that has the communication function may be stopped, or arbitrary code may be executed with the authority of the system that executes the process. According to product developers, this vulnerability could be exploited if the network of the entire system is properly managed, such as the network to which the affected product is connected is blocked from other networks. It is said that it is low. Yokogawa Japan Yokogawa Electric Corporation is a leader in measurement, industrial automation control, and information systems. A stack buffer overflow vulnerability exists in multiple Yokogawa products. The attacker sends a constructed packet to exploit the vulnerability to cause network communication to become unresponsive. \nSuccessful exploits may allow an attacker to execute arbitrary code or to cause a denial-of-service condition. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. Yokogawa CENTUM CS, etc. are all products of Japan\u0027s Yokogawa Electric (Yokogawa) company. Yokogawa CENTUM CS and CENTUM VP are large-scale production control systems. Exaopc is an OPC data access server", "sources": [ { "db": "NVD", "id": "CVE-2015-5627" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "BID", "id": "76709" }, { "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-83588" }, { "db": "VULMON", "id": "CVE-2015-5627" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5627", "trust": 3.7 }, { "db": "ICS CERT", "id": "ICSA-15-253-01", "trust": 3.5 }, { "db": "CNVD", "id": "CNVD-2015-05996", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201509-478", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92677348", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-004852", "trust": 0.8 }, { "db": "BID", "id": "76709", "trust": 0.4 }, { "db": "IVD", "id": "81266B0E-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-83588", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-5627", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "VULHUB", "id": "VHN-83588" }, { "db": "VULMON", "id": "CVE-2015-5627" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5627" }, { "db": "CNNVD", "id": "CNNVD-201509-478" } ] }, "id": "VAR-202002-0866", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "VULHUB", "id": "VHN-83588" } ], "trust": 1.3960373416666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05996" } ] }, "last_update_date": "2023-12-18T12:35:45.324000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u6a2a\u6cb3\u96fb\u6a5f\u682a\u5f0f\u4f1a\u793e \u306e\u544a\u77e5\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm" }, { "title": "Patch for Yokogawa Multiple Product Stack Buffer Overflow Vulnerability (CNVD-2015-05996)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/63994" }, { "title": "Multiple Yokogawa Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=108066" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "CNNVD", "id": "CNNVD-201509-478" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83588" }, { "db": "NVD", "id": "CVE-2015-5627" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-253-01" }, { "trust": 2.1, "url": "http://www.yokogawa.com/dcs/security/ysar/ysar-15-0003e.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5626" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5627" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5628" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu92677348/index.html" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5627" }, { "trust": 0.3, "url": "http://www.yokogawa.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/76709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "VULHUB", "id": "VHN-83588" }, { "db": "VULMON", "id": "CVE-2015-5627" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5627" }, { "db": "CNNVD", "id": "CNNVD-201509-478" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05996" }, { "db": "VULHUB", "id": "VHN-83588" }, { "db": "VULMON", "id": "CVE-2015-5627" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5627" }, { "db": "CNNVD", "id": "CNNVD-201509-478" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-16T00:00:00", "db": "IVD", "id": "81266b0e-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-09-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-05996" }, { "date": "2020-02-05T00:00:00", "db": "VULHUB", "id": "VHN-83588" }, { "date": "2020-02-05T00:00:00", "db": "VULMON", "id": "CVE-2015-5627" }, { "date": "2015-09-10T00:00:00", "db": "BID", "id": "76709" }, { "date": "2015-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "date": "2020-02-05T19:15:10.350000", "db": "NVD", "id": "CVE-2015-5627" }, { "date": "2015-09-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-478" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-05996" }, { "date": "2020-02-12T00:00:00", "db": "VULHUB", "id": "VHN-83588" }, { "date": "2020-02-12T00:00:00", "db": "VULMON", "id": "CVE-2015-5627" }, { "date": "2015-09-10T00:00:00", "db": "BID", "id": "76709" }, { "date": "2015-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "date": "2020-02-12T20:21:12.310000", "db": "NVD", "id": "CVE-2015-5627" }, { "date": "2020-05-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-478" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-478" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CENTUM Including multiple YOKOGAWA Multiple vulnerabilities in product communication functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004852" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-478" } ], "trust": 0.6 } }
var-202002-0867
Vulnerability from variot
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet. Provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product's communication capabilities. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product's communication capabilities. * * Vulnerability that stops communication functions by receiving specially crafted packets (CVE-2015-5626) * * Vulnerability that could cause a process to stop by receiving a specially crafted packet (CVE-2015-5627) * * Vulnerability that allows arbitrary code to be executed by receiving specially crafted packets (CVE-2015-5628) For details, please check the information provided by the product developer.By receiving a specially crafted communication frame, the communication function and the process that has the communication function may be stopped, or arbitrary code may be executed with the authority of the system that executes the process. According to product developers, this vulnerability could be exploited if the network of the entire system is properly managed, such as the network to which the affected product is connected is blocked from other networks. It is said that it is low. Yokogawa Japan Yokogawa Electric Corporation is a leader in measurement, industrial automation control, and information systems. A stack buffer overflow vulnerability exists in multiple Yokogawa products. The attacker sends a constructed packet to exploit the vulnerability to cause network communication to become unresponsive. Successful exploits may allow an attacker to execute arbitrary code or to cause a denial-of-service condition. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. Yokogawa CENTUM CS 3000, etc. are all products of Japan Yokogawa (Yokogawa). Yokogawa CENTUM CS 3000 is a large-scale production control system. Exaopc is an OPC data access server. Exaquantum is a plant information management system (PIMS) for the process industry
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0867", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "prosafe-rs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.02.10" }, { "model": "exaplog", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.40.00" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "field wireless device opc server", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.01.02" }, { "model": "exaquantum", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.85.00" }, { "model": "b\\/m9000 vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r7.03.04" }, { "model": "stardom opc server", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.40" }, { "model": "centum cs 3000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "centum vp entry", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "exapilot", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.96.10" }, { "model": "fieldmate", "scope": "eq", "trust": 1.0, "vendor": "yokogawa", "version": "r1.02" }, { "model": "exaopc", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.72.00" }, { "model": "centum cs 3000 entry", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "exarqe", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.20" }, { "model": "plant resource manager", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.12.00" }, { "model": "exasmoc", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.20" }, { "model": "exaquantum\\/batch", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.50.30" }, { "model": "centum cs 1000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.08.70" }, { "model": "versatile data server software", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r7.30.01" }, { "model": "b\\/m9000cs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.05.01" }, { "model": "fieldmate", "scope": "eq", "trust": 1.0, "vendor": "yokogawa", "version": "r1.01" }, { "model": "scada software \\", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r10.01" }, { "model": "exaopc \u003c=r3.72.00", "scope": null, "trust": 0.8, "vendor": "yokogawa", "version": null }, { "model": "centum centum cs", "scope": "eq", "trust": 0.8, "vendor": "yokogawa", "version": "1000" }, { "model": "b/m9000 vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r7.03.04 )" }, { "model": "b/m9000cs", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r5.05.01 )" }, { "model": "centum cs 1000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.08.70 )" }, { "model": "centum cs 3000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.09.50 )" }, { "model": "centum cs 3000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "small (r3.09.50 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r5.04.20 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "basic (r5.04.20 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "small (r5.04.20 )" }, { "model": "exaopc", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.72.00 )" }, { "model": "exapilot", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.96.10 )" }, { "model": "exaplog", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.40.00 )" }, { "model": "exaquantum", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r2.85.00 )" }, { "model": "exaquantum", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "/batch (r2.50.30 )" }, { "model": "exarqe", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r4.03.20 )" }, { "model": "exasmoc", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r4.03.20 )" }, { "model": "fast/tools", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r10.01 )" }, { "model": "fieldmate", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r1.01 and r1.02)" }, { "model": "prm", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.12.00 )" }, { "model": "prosafe-rs", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.02.10 )" }, { "model": "stardom", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "opc server for windows (r3.40 )" }, { "model": "stardom", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "vds (r7.30.01 )" }, { "model": "for field wireless opc server", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r2.01.02 )" }, { "model": "centum centum vp entry", "scope": null, "trust": 0.6, "vendor": "yokogawa", "version": null }, { "model": "centum centum vp", "scope": null, "trust": 0.6, "vendor": "yokogawa", "version": null }, { "model": "centum centum cs entry", "scope": "eq", "trust": 0.6, "vendor": "yokogawa", "version": "3000" }, { "model": "centum centum cs", "scope": "eq", "trust": 0.6, "vendor": "yokogawa", "version": "3000" }, { "model": "stardom vds r7.30.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "stardom opc server for windows r3.40", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r3.02.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r2.03.80", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r1.03.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prm r3.12.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prm r3.11.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fieldmate r1.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fieldmate r1.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "field wireless device opc server r2.01.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "field wireless device opc server r2.01.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.05-sp2", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.05", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.04", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.03", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r10.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exasmoc r4.03.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exarqe r4.03.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum/batch r2.50.30", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum/batch r2.50.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.85.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.80.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.50.30", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.02.50", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaplog r3.40.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exapilot r3.96.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exapilot r3.96.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.72.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.72.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.71.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3.72.00" }, { "model": "exaopc", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3.71.02" }, { "model": "centum vp entry r5.04.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r5.04.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r5.04.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r4.03.56", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r4.03.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum cs entry r3.09.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.09.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.09", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.70", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.07", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.06", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.05", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.04", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.03", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.02", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.01", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.70", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "1000" }, { "model": "b/m9000cs r5.05.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "b/m9000 vp r7.03.04", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "b/m9000 vp r7.03.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum centum vp entry", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "*" }, { "model": "centum centum vp", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "*" }, { "model": "centum centum cs entry", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "3000*" }, { "model": "centum centum cs", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "3000*" } ], "sources": [ { "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5628" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.08.70", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:prosafe-rs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.02.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:prosafe-rs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.72.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exapilot:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.96.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaplog:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.40.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaquantum:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.85.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaquantum\\/batch:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.50.30", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exarqe:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exasmoc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.20", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:field_wireless_device_opc_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.01.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:field_wireless_device_opc_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.12.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:scada_software_\\(fast\\/tools\\):*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r10.01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:versatile_data_server_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r7.30.01", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.05.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r7.03.04", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:fieldmate:r1.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:fieldmate:r1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:stardom_opc_server:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionEndIncluding": "r3.40", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:stardom_opc_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-5628" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "76709" } ], "trust": 0.3 }, "cve": "CVE-2015-5628", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2015-004852", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2015-05995", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "81247038-2351-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-83589", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-5628", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-5628", "trust": 1.0, "value": "CRITICAL" }, { "author": "IPA", "id": "JVNDB-2015-004852", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-05995", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201509-479", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-83589", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-5628", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "VULHUB", "id": "VHN-83589" }, { "db": "VULMON", "id": "CVE-2015-5628" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5628" }, { "db": "CNNVD", "id": "CNNVD-201509-479" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet. Provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product\u0027s communication capabilities. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product\u0027s communication capabilities. * * Vulnerability that stops communication functions by receiving specially crafted packets (CVE-2015-5626) * * Vulnerability that could cause a process to stop by receiving a specially crafted packet (CVE-2015-5627) * * Vulnerability that allows arbitrary code to be executed by receiving specially crafted packets (CVE-2015-5628) For details, please check the information provided by the product developer.By receiving a specially crafted communication frame, the communication function and the process that has the communication function may be stopped, or arbitrary code may be executed with the authority of the system that executes the process. According to product developers, this vulnerability could be exploited if the network of the entire system is properly managed, such as the network to which the affected product is connected is blocked from other networks. It is said that it is low. Yokogawa Japan Yokogawa Electric Corporation is a leader in measurement, industrial automation control, and information systems. A stack buffer overflow vulnerability exists in multiple Yokogawa products. The attacker sends a constructed packet to exploit the vulnerability to cause network communication to become unresponsive. \nSuccessful exploits may allow an attacker to execute arbitrary code or to cause a denial-of-service condition. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. Yokogawa CENTUM CS 3000, etc. are all products of Japan Yokogawa (Yokogawa). Yokogawa CENTUM CS 3000 is a large-scale production control system. Exaopc is an OPC data access server. Exaquantum is a plant information management system (PIMS) for the process industry", "sources": [ { "db": "NVD", "id": "CVE-2015-5628" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "BID", "id": "76709" }, { "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-83589" }, { "db": "VULMON", "id": "CVE-2015-5628" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5628", "trust": 3.7 }, { "db": "ICS CERT", "id": "ICSA-15-253-01", "trust": 3.5 }, { "db": "CNNVD", "id": "CNNVD-201509-479", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2015-05995", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92677348", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-004852", "trust": 0.8 }, { "db": "BID", "id": "76709", "trust": 0.4 }, { "db": "IVD", "id": "81247038-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-83589", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-5628", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "VULHUB", "id": "VHN-83589" }, { "db": "VULMON", "id": "CVE-2015-5628" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5628" }, { "db": "CNNVD", "id": "CNNVD-201509-479" } ] }, "id": "VAR-202002-0867", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "VULHUB", "id": "VHN-83589" } ], "trust": 1.3960373416666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05995" } ] }, "last_update_date": "2023-12-18T12:35:45.366000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u6a2a\u6cb3\u96fb\u6a5f\u682a\u5f0f\u4f1a\u793e \u306e\u544a\u77e5\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm" }, { "title": "Patch for Yokogawa Multiple Product Stack Buffer Overflow Vulnerability (CNVD-2015-05995)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/63993" }, { "title": "Multiple Yokogawa Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=108067" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "CNNVD", "id": "CNNVD-201509-479" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83589" }, { "db": "NVD", "id": "CVE-2015-5628" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-253-01" }, { "trust": 2.1, "url": "http://www.yokogawa.com/dcs/security/ysar/ysar-15-0003e.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5626" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5627" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5628" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu92677348/index.html" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5628" }, { "trust": 0.3, "url": "http://www.yokogawa.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/76709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "VULHUB", "id": "VHN-83589" }, { "db": "VULMON", "id": "CVE-2015-5628" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5628" }, { "db": "CNNVD", "id": "CNNVD-201509-479" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05995" }, { "db": "VULHUB", "id": "VHN-83589" }, { "db": "VULMON", "id": "CVE-2015-5628" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5628" }, { "db": "CNNVD", "id": "CNNVD-201509-479" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-16T00:00:00", "db": "IVD", "id": "81247038-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-09-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-05995" }, { "date": "2020-02-05T00:00:00", "db": "VULHUB", "id": "VHN-83589" }, { "date": "2020-02-05T00:00:00", "db": "VULMON", "id": "CVE-2015-5628" }, { "date": "2015-09-10T00:00:00", "db": "BID", "id": "76709" }, { "date": "2015-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "date": "2020-02-05T19:15:10.397000", "db": "NVD", "id": "CVE-2015-5628" }, { "date": "2015-09-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-479" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-05995" }, { "date": "2020-02-12T00:00:00", "db": "VULHUB", "id": "VHN-83589" }, { "date": "2020-02-12T00:00:00", "db": "VULMON", "id": "CVE-2015-5628" }, { "date": "2015-09-10T00:00:00", "db": "BID", "id": "76709" }, { "date": "2015-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "date": "2020-02-12T20:16:13.513000", "db": "NVD", "id": "CVE-2015-5628" }, { "date": "2020-05-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-479" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-479" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CENTUM Including multiple YOKOGAWA Multiple vulnerabilities in product communication functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004852" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-479" } ], "trust": 0.6 } }
var-202002-0865
Vulnerability from variot
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet. Provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product's communication capabilities. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product's communication capabilities. * * Vulnerability that stops communication functions by receiving specially crafted packets (CVE-2015-5626) * * Vulnerability that could cause a process to stop by receiving a specially crafted packet (CVE-2015-5627) * * Vulnerability that allows arbitrary code to be executed by receiving specially crafted packets (CVE-2015-5628) For details, please check the information provided by the product developer.By receiving a specially crafted communication frame, the communication function and the process that has the communication function may be stopped, or arbitrary code may be executed with the authority of the system that executes the process. According to product developers, this vulnerability could be exploited if the network of the entire system is properly managed, such as the network to which the affected product is connected is blocked from other networks. It is said that it is low. Yokogawa Japan Yokogawa Electric Corporation is a leader in measurement, industrial automation control, and information systems. A stack buffer overflow vulnerability exists in multiple Yokogawa products. The attacker sends a constructed packet to exploit the vulnerability to cause network communication to become unresponsive. Successful exploits may allow an attacker to execute arbitrary code or to cause a denial-of-service condition. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. Yokogawa CENTUM CS, etc. are all products of Japan's Yokogawa Electric (Yokogawa) company. Yokogawa CENTUM CS and CENTUM VP are large-scale production control systems. Exaopc is an OPC data access server
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0865", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "prosafe-rs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.02.10" }, { "model": "exaplog", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.40.00" }, { "model": "centum vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "field wireless device opc server", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.01.02" }, { "model": "exaquantum", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.85.00" }, { "model": "b\\/m9000 vp", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r7.03.04" }, { "model": "stardom opc server", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.40" }, { "model": "centum cs 3000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "centum vp entry", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.04.20" }, { "model": "exapilot", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.96.10" }, { "model": "fieldmate", "scope": "eq", "trust": 1.0, "vendor": "yokogawa", "version": "r1.02" }, { "model": "exaopc", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.72.00" }, { "model": "centum cs 3000 entry", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.09.50" }, { "model": "exarqe", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.20" }, { "model": "plant resource manager", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.12.00" }, { "model": "exasmoc", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r4.03.20" }, { "model": "exaquantum\\/batch", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r2.50.30" }, { "model": "centum cs 1000", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r3.08.70" }, { "model": "versatile data server software", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r7.30.01" }, { "model": "b\\/m9000cs", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r5.05.01" }, { "model": "fieldmate", "scope": "eq", "trust": 1.0, "vendor": "yokogawa", "version": "r1.01" }, { "model": "scada software \\", "scope": "lte", "trust": 1.0, "vendor": "yokogawa", "version": "r10.01" }, { "model": "exaopc \u003c=r3.72.00", "scope": null, "trust": 0.8, "vendor": "yokogawa", "version": null }, { "model": "centum centum cs", "scope": "eq", "trust": 0.8, "vendor": "yokogawa", "version": "1000" }, { "model": "b/m9000 vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r7.03.04 )" }, { "model": "b/m9000cs", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r5.05.01 )" }, { "model": "centum cs 1000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.08.70 )" }, { "model": "centum cs 3000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.09.50 )" }, { "model": "centum cs 3000", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "small (r3.09.50 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r5.04.20 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "basic (r5.04.20 )" }, { "model": "centum vp", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "small (r5.04.20 )" }, { "model": "exaopc", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.72.00 )" }, { "model": "exapilot", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.96.10 )" }, { "model": "exaplog", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.40.00 )" }, { "model": "exaquantum", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r2.85.00 )" }, { "model": "exaquantum", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "/batch (r2.50.30 )" }, { "model": "exarqe", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r4.03.20 )" }, { "model": "exasmoc", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r4.03.20 )" }, { "model": "fast/tools", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r10.01 )" }, { "model": "fieldmate", "scope": "eq", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r1.01 and r1.02)" }, { "model": "prm", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.12.00 )" }, { "model": "prosafe-rs", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r3.02.10 )" }, { "model": "stardom", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "opc server for windows (r3.40 )" }, { "model": "stardom", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "vds (r7.30.01 )" }, { "model": "for field wireless opc server", "scope": "lte", "trust": 0.8, "vendor": "yokogawa electric", "version": "(r2.01.02 )" }, { "model": "centum centum vp entry", "scope": null, "trust": 0.6, "vendor": "yokogawa", "version": null }, { "model": "centum centum vp", "scope": null, "trust": 0.6, "vendor": "yokogawa", "version": null }, { "model": "centum centum cs entry", "scope": "eq", "trust": 0.6, "vendor": "yokogawa", "version": "3000" }, { "model": "centum centum cs", "scope": "eq", "trust": 0.6, "vendor": "yokogawa", "version": "3000" }, { "model": "stardom vds r7.30.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "stardom opc server for windows r3.40", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r3.02.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r2.03.80", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prosafe-rs r1.03.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prm r3.12.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "prm r3.11.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fieldmate r1.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fieldmate r1.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "field wireless device opc server r2.01.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "field wireless device opc server r2.01.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.05-sp2", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.05", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.04", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.03", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r9.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "fast/tools r10.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exasmoc r4.03.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exarqe r4.03.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum/batch r2.50.30", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum/batch r2.50.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.85.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.80.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.50.30", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaquantum r2.02.50", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaplog r3.40.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exapilot r3.96.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exapilot r3.96.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.72.10", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.72.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc r3.71.02", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "exaopc", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3.72.00" }, { "model": "exaopc", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3.71.02" }, { "model": "centum vp entry r5.04.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r5.04.20", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r5.04.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r4.03.56", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum vp r4.03.00", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum cs entry r3.09.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.09.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.09", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.70", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.50", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.07", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.06", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.05", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.04", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.03", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.02", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.01", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "3000" }, { "model": "centum cs r3.08.70", "scope": "eq", "trust": 0.3, "vendor": "yokogawa", "version": "1000" }, { "model": "b/m9000cs r5.05.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "b/m9000 vp r7.03.04", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "b/m9000 vp r7.03.01", "scope": null, "trust": 0.3, "vendor": "yokogawa", "version": null }, { "model": "centum centum vp entry", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "*" }, { "model": "centum centum vp", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "*" }, { "model": "centum centum cs entry", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "3000*" }, { "model": "centum centum cs", "scope": "eq", "trust": 0.2, "vendor": "yokogawa", "version": "3000*" } ], "sources": [ { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5626" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.08.70", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:prosafe-rs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.02.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:prosafe-rs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.72.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exapilot:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.96.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaplog:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.40.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaquantum:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.85.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exaquantum\\/batch:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.50.30", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exarqe:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:exasmoc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r4.03.20", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:field_wireless_device_opc_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r2.01.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:field_wireless_device_opc_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r3.12.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:scada_software_\\(fast\\/tools\\):*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r10.01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:versatile_data_server_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r7.30.01", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r5.05.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:b\\/m9000_vp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "r7.03.04", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yokogawa:fieldmate:r1.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:yokogawa:fieldmate:r1.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:yokogawa:stardom_opc_server:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionEndIncluding": "r3.40", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:yokogawa:stardom_opc_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-5626" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "76709" } ], "trust": 0.3 }, "cve": "CVE-2015-5626", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2015-004852", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2015-05997", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "8128c7be-2351-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-83587", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-5626", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-5626", "trust": 1.0, "value": "CRITICAL" }, { "author": "IPA", "id": "JVNDB-2015-004852", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-05997", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201509-477", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-83587", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-5626", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "VULHUB", "id": "VHN-83587" }, { "db": "VULMON", "id": "CVE-2015-5626" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5626" }, { "db": "CNNVD", "id": "CNNVD-201509-477" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet. Provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product\u0027s communication capabilities. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA There are multiple vulnerabilities in the product\u0027s communication capabilities. * * Vulnerability that stops communication functions by receiving specially crafted packets (CVE-2015-5626) * * Vulnerability that could cause a process to stop by receiving a specially crafted packet (CVE-2015-5627) * * Vulnerability that allows arbitrary code to be executed by receiving specially crafted packets (CVE-2015-5628) For details, please check the information provided by the product developer.By receiving a specially crafted communication frame, the communication function and the process that has the communication function may be stopped, or arbitrary code may be executed with the authority of the system that executes the process. According to product developers, this vulnerability could be exploited if the network of the entire system is properly managed, such as the network to which the affected product is connected is blocked from other networks. It is said that it is low. Yokogawa Japan Yokogawa Electric Corporation is a leader in measurement, industrial automation control, and information systems. A stack buffer overflow vulnerability exists in multiple Yokogawa products. The attacker sends a constructed packet to exploit the vulnerability to cause network communication to become unresponsive. \nSuccessful exploits may allow an attacker to execute arbitrary code or to cause a denial-of-service condition. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. Yokogawa CENTUM CS, etc. are all products of Japan\u0027s Yokogawa Electric (Yokogawa) company. Yokogawa CENTUM CS and CENTUM VP are large-scale production control systems. Exaopc is an OPC data access server", "sources": [ { "db": "NVD", "id": "CVE-2015-5626" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "BID", "id": "76709" }, { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "VULHUB", "id": "VHN-83587" }, { "db": "VULMON", "id": "CVE-2015-5626" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5626", "trust": 3.7 }, { "db": "ICS CERT", "id": "ICSA-15-253-01", "trust": 3.5 }, { "db": "CNVD", "id": "CNVD-2015-05997", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201509-477", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92677348", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-004852", "trust": 0.8 }, { "db": "BID", "id": "76709", "trust": 0.4 }, { "db": "IVD", "id": "8128C7BE-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-83587", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-5626", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "VULHUB", "id": "VHN-83587" }, { "db": "VULMON", "id": "CVE-2015-5626" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5626" }, { "db": "CNNVD", "id": "CNNVD-201509-477" } ] }, "id": "VAR-202002-0865", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "VULHUB", "id": "VHN-83587" } ], "trust": 1.3960373416666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05997" } ] }, "last_update_date": "2023-12-18T12:35:45.282000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u6a2a\u6cb3\u96fb\u6a5f\u682a\u5f0f\u4f1a\u793e \u306e\u544a\u77e5\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm" }, { "title": "Patch of Yokogawa Multiple Product Stack Buffer Overflow Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/63995" }, { "title": "Multiple Yokogawa Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=108065" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "CNNVD", "id": "CNNVD-201509-477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83587" }, { "db": "NVD", "id": "CVE-2015-5626" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-253-01" }, { "trust": 2.1, "url": "http://www.yokogawa.com/dcs/security/ysar/ysar-15-0003e.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5626" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5627" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5628" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu92677348/index.html" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5626" }, { "trust": 0.3, "url": "http://www.yokogawa.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/76709" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "VULHUB", "id": "VHN-83587" }, { "db": "VULMON", "id": "CVE-2015-5626" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5626" }, { "db": "CNNVD", "id": "CNNVD-201509-477" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05997" }, { "db": "VULHUB", "id": "VHN-83587" }, { "db": "VULMON", "id": "CVE-2015-5626" }, { "db": "BID", "id": "76709" }, { "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "db": "NVD", "id": "CVE-2015-5626" }, { "db": "CNNVD", "id": "CNNVD-201509-477" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-16T00:00:00", "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-09-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-05997" }, { "date": "2020-02-05T00:00:00", "db": "VULHUB", "id": "VHN-83587" }, { "date": "2020-02-05T00:00:00", "db": "VULMON", "id": "CVE-2015-5626" }, { "date": "2015-09-10T00:00:00", "db": "BID", "id": "76709" }, { "date": "2015-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "date": "2020-02-05T19:15:10.240000", "db": "NVD", "id": "CVE-2015-5626" }, { "date": "2015-09-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-477" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-05997" }, { "date": "2020-02-12T00:00:00", "db": "VULHUB", "id": "VHN-83587" }, { "date": "2020-02-12T00:00:00", "db": "VULMON", "id": "CVE-2015-5626" }, { "date": "2015-09-10T00:00:00", "db": "BID", "id": "76709" }, { "date": "2015-09-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004852" }, { "date": "2020-02-12T19:29:49.680000", "db": "NVD", "id": "CVE-2015-5626" }, { "date": "2020-05-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-477" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Yokogawa Multiple Product Stack Buffer Overflow Vulnerabilities", "sources": [ { "db": "IVD", "id": "8128c7be-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-05997" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-477" } ], "trust": 0.6 } }
cve-2015-5627
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | x_refsource_MISC | |
http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Yokogawa | CENTUM CS 1000 |
Version: R3.08.70 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:02.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 1000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.08.70 and earlier" } ] }, { "product": "CENTUM CS 3000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM CS 3000 Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "CENTUM VP Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "ProSafe-RS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.02.10 and earlier" } ] }, { "product": "Exaopc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.72.00 and earlier" } ] }, { "product": "Exaquantum", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.85.00 and earlier" } ] }, { "product": "Exaquantum/Batch", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.50.30 and earlier" } ] }, { "product": "Exapilot", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.96.10 and earlier" } ] }, { "product": "Exaplog", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40.00 and earlier" } ] }, { "product": "Exasmoc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Exarqe", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Field Wireless Device OPC Server", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.01.02 and earlier" } ] }, { "product": "PRM", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.12.00 and earlier" } ] }, { "product": "STARDOM VDS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.30.01 and earlier" } ] }, { "product": "STARDOM OPC Server for Windows", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40 and earlier" } ] }, { "product": "FAST/TOOLS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R10.01 and earlier" } ] }, { "product": "B/M9000CS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.05.01 and earlier" } ] }, { "product": "B/M9000 VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.03.04 and earlier" } ] }, { "product": "FieldMate", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R1.01" }, { "status": "affected", "version": "R1.02" } ] } ], "datePublic": "2015-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:45:58", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 1000", "version": { "version_data": [ { "version_value": "R3.08.70 and earlier" } ] } }, { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM CS 3000 Entry", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "CENTUM VP Entry", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "ProSafe-RS", "version": { "version_data": [ { "version_value": "R3.02.10 and earlier" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "R3.72.00 and earlier" } ] } }, { "product_name": "Exaquantum", "version": { "version_data": [ { "version_value": "R2.85.00 and earlier" } ] } }, { "product_name": "Exaquantum/Batch", "version": { "version_data": [ { "version_value": "R2.50.30 and earlier" } ] } }, { "product_name": "Exapilot", "version": { "version_data": [ { "version_value": "R3.96.10 and earlier" } ] } }, { "product_name": "Exaplog", "version": { "version_data": [ { "version_value": "R3.40.00 and earlier" } ] } }, { "product_name": "Exasmoc", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Exarqe", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Field Wireless Device OPC Server", "version": { "version_data": [ { "version_value": "R2.01.02 and earlier" } ] } }, { "product_name": "PRM", "version": { "version_data": [ { "version_value": "R3.12.00 and earlier" } ] } }, { "product_name": "STARDOM VDS", "version": { "version_data": [ { "version_value": "R7.30.01 and earlier" } ] } }, { "product_name": "STARDOM OPC Server for Windows", "version": { "version_data": [ { "version_value": "R3.40 and earlier" } ] } }, { "product_name": "FAST/TOOLS", "version": { "version_data": [ { "version_value": "R10.01 and earlier" } ] } }, { "product_name": "B/M9000CS", "version": { "version_data": [ { "version_value": "R5.05.01 and earlier" } ] } }, { "product_name": "B/M9000 VP", "version": { "version_data": [ { "version_value": "R7.03.04 and earlier" } ] } }, { "product_name": "FieldMate", "version": { "version_data": [ { "version_value": "R1.01" }, { "version_value": "R1.02" } ] } } ] }, "vendor_name": "Yokogawa" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-5627", "datePublished": "2020-02-05T18:45:58", "dateReserved": "2015-07-24T00:00:00", "dateUpdated": "2024-08-06T06:59:02.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5628
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | x_refsource_MISC | |
http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Yokogawa | CENTUM CS 1000 |
Version: R3.08.70 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:02.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 1000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.08.70 and earlier" } ] }, { "product": "CENTUM CS 3000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM CS 3000 Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "CENTUM VP Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "ProSafe-RS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.02.10 and earlier" } ] }, { "product": "Exaopc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.72.00 and earlier" } ] }, { "product": "Exaquantum", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.85.00 and earlier" } ] }, { "product": "Exaquantum/Batch", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.50.30 and earlier" } ] }, { "product": "Exapilot", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.96.10 and earlier" } ] }, { "product": "Exaplog", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40.00 and earlier" } ] }, { "product": "Exasmoc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Exarqe", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Field Wireless Device OPC Server", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.01.02 and earlier" } ] }, { "product": "PRM", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.12.00 and earlier" } ] }, { "product": "STARDOM VDS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.30.01 and earlier" } ] }, { "product": "STARDOM OPC Server for Windows", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40 and earlier" } ] }, { "product": "FAST/TOOLS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R10.01 and earlier" } ] }, { "product": "B/M9000CS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.05.01 and earlier" } ] }, { "product": "B/M9000 VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.03.04 and earlier" } ] }, { "product": "FieldMate", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R1.01" }, { "status": "affected", "version": "R1.02" } ] } ], "datePublic": "2015-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:46:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 1000", "version": { "version_data": [ { "version_value": "R3.08.70 and earlier" } ] } }, { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM CS 3000 Entry", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "CENTUM VP Entry", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "ProSafe-RS", "version": { "version_data": [ { "version_value": "R3.02.10 and earlier" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "R3.72.00 and earlier" } ] } }, { "product_name": "Exaquantum", "version": { "version_data": [ { "version_value": "R2.85.00 and earlier" } ] } }, { "product_name": "Exaquantum/Batch", "version": { "version_data": [ { "version_value": "R2.50.30 and earlier" } ] } }, { "product_name": "Exapilot", "version": { "version_data": [ { "version_value": "R3.96.10 and earlier" } ] } }, { "product_name": "Exaplog", "version": { "version_data": [ { "version_value": "R3.40.00 and earlier" } ] } }, { "product_name": "Exasmoc", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Exarqe", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Field Wireless Device OPC Server", "version": { "version_data": [ { "version_value": "R2.01.02 and earlier" } ] } }, { "product_name": "PRM", "version": { "version_data": [ { "version_value": "R3.12.00 and earlier" } ] } }, { "product_name": "STARDOM VDS", "version": { "version_data": [ { "version_value": "R7.30.01 and earlier" } ] } }, { "product_name": "STARDOM OPC Server for Windows", "version": { "version_data": [ { "version_value": "R3.40 and earlier" } ] } }, { "product_name": "FAST/TOOLS", "version": { "version_data": [ { "version_value": "R10.01 and earlier" } ] } }, { "product_name": "B/M9000CS", "version": { "version_data": [ { "version_value": "R5.05.01 and earlier" } ] } }, { "product_name": "B/M9000 VP", "version": { "version_data": [ { "version_value": "R7.03.04 and earlier" } ] } }, { "product_name": "FieldMate", "version": { "version_data": [ { "version_value": "R1.01" }, { "version_value": "R1.02" } ] } } ] }, "vendor_name": "Yokogawa" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-5628", "datePublished": "2020-02-05T18:46:01", "dateReserved": "2015-07-24T00:00:00", "dateUpdated": "2024-08-06T06:59:02.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5626
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | x_refsource_MISC | |
http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Yokogawa | CENTUM CS 1000 |
Version: R3.08.70 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:02.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 1000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.08.70 and earlier" } ] }, { "product": "CENTUM CS 3000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM CS 3000 Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "CENTUM VP Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "ProSafe-RS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.02.10 and earlier" } ] }, { "product": "Exaopc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.72.00 and earlier" } ] }, { "product": "Exaquantum", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.85.00 and earlier" } ] }, { "product": "Exaquantum/Batch", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.50.30 and earlier" } ] }, { "product": "Exapilot", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.96.10 and earlier" } ] }, { "product": "Exaplog", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40.00 and earlier" } ] }, { "product": "Exasmoc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Exarqe", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Field Wireless Device OPC Server", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.01.02 and earlier" } ] }, { "product": "PRM", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.12.00 and earlier" } ] }, { "product": "STARDOM VDS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.30.01 and earlier" } ] }, { "product": "STARDOM OPC Server for Windows", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40 and earlier" } ] }, { "product": "FAST/TOOLS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R10.01 and earlier" } ] }, { "product": "B/M9000CS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.05.01 and earlier" } ] }, { "product": "B/M9000 VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.03.04 and earlier" } ] }, { "product": "FieldMate", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R1.01" }, { "status": "affected", "version": "R1.02" } ] } ], "datePublic": "2015-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:46:05", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 1000", "version": { "version_data": [ { "version_value": "R3.08.70 and earlier" } ] } }, { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM CS 3000 Entry", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "CENTUM VP Entry", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "ProSafe-RS", "version": { "version_data": [ { "version_value": "R3.02.10 and earlier" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "R3.72.00 and earlier" } ] } }, { "product_name": "Exaquantum", "version": { "version_data": [ { "version_value": "R2.85.00 and earlier" } ] } }, { "product_name": "Exaquantum/Batch", "version": { "version_data": [ { "version_value": "R2.50.30 and earlier" } ] } }, { "product_name": "Exapilot", "version": { "version_data": [ { "version_value": "R3.96.10 and earlier" } ] } }, { "product_name": "Exaplog", "version": { "version_data": [ { "version_value": "R3.40.00 and earlier" } ] } }, { "product_name": "Exasmoc", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Exarqe", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Field Wireless Device OPC Server", "version": { "version_data": [ { "version_value": "R2.01.02 and earlier" } ] } }, { "product_name": "PRM", "version": { "version_data": [ { "version_value": "R3.12.00 and earlier" } ] } }, { "product_name": "STARDOM VDS", "version": { "version_data": [ { "version_value": "R7.30.01 and earlier" } ] } }, { "product_name": "STARDOM OPC Server for Windows", "version": { "version_data": [ { "version_value": "R3.40 and earlier" } ] } }, { "product_name": "FAST/TOOLS", "version": { "version_data": [ { "version_value": "R10.01 and earlier" } ] } }, { "product_name": "B/M9000CS", "version": { "version_data": [ { "version_value": "R5.05.01 and earlier" } ] } }, { "product_name": "B/M9000 VP", "version": { "version_data": [ { "version_value": "R7.03.04 and earlier" } ] } }, { "product_name": "FieldMate", "version": { "version_data": [ { "version_value": "R1.01" }, { "version_value": "R1.02" } ] } } ] }, "vendor_name": "Yokogawa" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-5626", "datePublished": "2020-02-05T18:46:05", "dateReserved": "2015-07-24T00:00:00", "dateUpdated": "2024-08-06T06:59:02.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }