All the vulnerabilites related to Yokogawa Electric Corporation - STARDOM
cve-2023-5915
Vulnerability from cvelistv5
Published
2023-12-01 06:12
Modified
2024-08-02 08:14
Severity ?
EPSS score ?
Summary
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition.
The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Yokogawa Electric Corporation | STARDOM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:24.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95177889/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "STARDOM", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "STARDOM FCN/FCJ R1.01 to R4.31" } ] } ], "datePublic": "2023-12-01T03:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation.\u0026nbsp;This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller\u2019s operation is not stopped by the condition.\u003cbr\u003e\u003cbr\u003eThe affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.\u003cbr\u003e" } ], "value": "A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation.\u00a0This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller\u2019s operation is not stopped by the condition.\n\nThe affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-01T06:14:45.335Z", "orgId": "7168b535-132a-4efe-a076-338f829b2eb9", "shortName": "YokogawaGroup" }, "references": [ { "url": "https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf" }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02" }, { "url": "https://jvn.jp/vu/JVNVU95177889/index.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7168b535-132a-4efe-a076-338f829b2eb9", "assignerShortName": "YokogawaGroup", "cveId": "CVE-2023-5915", "datePublished": "2023-12-01T06:12:03.581Z", "dateReserved": "2023-11-02T04:37:11.569Z", "dateUpdated": "2024-08-02T08:14:24.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }