All the vulnerabilites related to yokogawa - b\/m9000_vp
cve-2018-16196
Vulnerability from cvelistv5
Published
2019-01-09 22:00
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106442 | vdb-entry, x_refsource_BID | |
https://jvn.jp/vu/JVNVU93652047/index.html | x_refsource_MISC | |
https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Yokogawa Electric Corporation | Multiple Yokogawa products that contain Vnet/IP Open Communication Driver |
Version: (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106442", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106442" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU93652047/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Multiple Yokogawa products that contain Vnet/IP Open Communication Driver", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "(CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90))" } ] } ], "datePublic": "2019-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver\u0027s communication via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial-of-service (DoS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-10T10:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "106442", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106442" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU93652047/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-16196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Multiple Yokogawa products that contain Vnet/IP Open Communication Driver", "version": { "version_data": [ { "version_value": "(CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90))" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver\u0027s communication via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial-of-service (DoS)" } ] } ] }, "references": { "reference_data": [ { "name": "106442", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106442" }, { "name": "https://jvn.jp/vu/JVNVU93652047/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU93652047/index.html" }, { "name": "https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-16196", "datePublished": "2019-01-09T22:00:00", "dateReserved": "2018-08-30T00:00:00", "dateUpdated": "2024-08-05T10:17:38.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27188
Vulnerability from cvelistv5
Published
2022-04-15 01:45
Modified
2024-08-03 05:25
Severity ?
EPSS score ?
Summary
OS command injection vulnerability exists in CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02, which may allow an attacker who can access the computer where the affected product is installed to execute an arbitrary OS command by altering a file generated using Graphic Builder.
References
▼ | URL | Tags |
---|---|---|
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/ | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU99204686/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Yokogawa Electric Corporation | CENTUM VP series with VP6E5150(Graphic Builder) installed and B/M9000 VP |
Version: CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:25:31.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM VP series with VP6E5150(Graphic Builder) installed and B/M9000 VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02, which may allow an attacker who can access the computer where the affected product is installed to execute an arbitrary OS command by altering a file generated using Graphic Builder." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-15T01:45:23", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-27188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM VP series with VP6E5150(Graphic Builder) installed and B/M9000 VP", "version": { "version_data": [ { "version_value": "CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OS command injection vulnerability exists in CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02, which may allow an attacker who can access the computer where the affected product is installed to execute an arbitrary OS command by altering a file generated using Graphic Builder." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/", "refsource": "MISC", "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "name": "https://jvn.jp/vu/JVNVU99204686/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU99204686/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-27188", "datePublished": "2022-04-15T01:45:23", "dateReserved": "2022-04-01T00:00:00", "dateUpdated": "2024-08-03T05:25:31.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5626
Vulnerability from cvelistv5
Published
2020-02-05 18:46
Modified
2024-08-06 06:59
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet.
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | x_refsource_MISC | |
http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Yokogawa | CENTUM CS 1000 |
Version: R3.08.70 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:02.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 1000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.08.70 and earlier" } ] }, { "product": "CENTUM CS 3000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM CS 3000 Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "CENTUM VP Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "ProSafe-RS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.02.10 and earlier" } ] }, { "product": "Exaopc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.72.00 and earlier" } ] }, { "product": "Exaquantum", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.85.00 and earlier" } ] }, { "product": "Exaquantum/Batch", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.50.30 and earlier" } ] }, { "product": "Exapilot", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.96.10 and earlier" } ] }, { "product": "Exaplog", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40.00 and earlier" } ] }, { "product": "Exasmoc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Exarqe", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Field Wireless Device OPC Server", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.01.02 and earlier" } ] }, { "product": "PRM", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.12.00 and earlier" } ] }, { "product": "STARDOM VDS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.30.01 and earlier" } ] }, { "product": "STARDOM OPC Server for Windows", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40 and earlier" } ] }, { "product": "FAST/TOOLS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R10.01 and earlier" } ] }, { "product": "B/M9000CS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.05.01 and earlier" } ] }, { "product": "B/M9000 VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.03.04 and earlier" } ] }, { "product": "FieldMate", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R1.01" }, { "status": "affected", "version": "R1.02" } ] } ], "datePublic": "2015-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:46:05", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 1000", "version": { "version_data": [ { "version_value": "R3.08.70 and earlier" } ] } }, { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM CS 3000 Entry", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "CENTUM VP Entry", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "ProSafe-RS", "version": { "version_data": [ { "version_value": "R3.02.10 and earlier" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "R3.72.00 and earlier" } ] } }, { "product_name": "Exaquantum", "version": { "version_data": [ { "version_value": "R2.85.00 and earlier" } ] } }, { "product_name": "Exaquantum/Batch", "version": { "version_data": [ { "version_value": "R2.50.30 and earlier" } ] } }, { "product_name": "Exapilot", "version": { "version_data": [ { "version_value": "R3.96.10 and earlier" } ] } }, { "product_name": "Exaplog", "version": { "version_data": [ { "version_value": "R3.40.00 and earlier" } ] } }, { "product_name": "Exasmoc", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Exarqe", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Field Wireless Device OPC Server", "version": { "version_data": [ { "version_value": "R2.01.02 and earlier" } ] } }, { "product_name": "PRM", "version": { "version_data": [ { "version_value": "R3.12.00 and earlier" } ] } }, { "product_name": "STARDOM VDS", "version": { "version_data": [ { "version_value": "R7.30.01 and earlier" } ] } }, { "product_name": "STARDOM OPC Server for Windows", "version": { "version_data": [ { "version_value": "R3.40 and earlier" } ] } }, { "product_name": "FAST/TOOLS", "version": { "version_data": [ { "version_value": "R10.01 and earlier" } ] } }, { "product_name": "B/M9000CS", "version": { "version_data": [ { "version_value": "R5.05.01 and earlier" } ] } }, { "product_name": "B/M9000 VP", "version": { "version_data": [ { "version_value": "R7.03.04 and earlier" } ] } }, { "product_name": "FieldMate", "version": { "version_data": [ { "version_value": "R1.01" }, { "version_value": "R1.02" } ] } } ] }, "vendor_name": "Yokogawa" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-5626", "datePublished": "2020-02-05T18:46:05", "dateReserved": "2015-07-24T00:00:00", "dateUpdated": "2024-08-06T06:59:02.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3888
Vulnerability from cvelistv5
Published
2014-07-10 10:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet.
References
▼ | URL | Tags |
---|---|---|
http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf | x_refsource_CONFIRM | |
http://www.exploit-db.com/exploits/34009 | exploit, x_refsource_EXPLOIT-DB | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01 | x_refsource_MISC | |
http://osvdb.org/show/osvdb/108756 | vdb-entry, x_refsource_OSVDB | |
http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:57:17.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf" }, { "name": "34009", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/34009" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01" }, { "name": "108756", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/show/osvdb/108756" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-12T18:57:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf" }, { "name": "34009", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/34009" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01" }, { "name": "108756", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/show/osvdb/108756" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2014-3888", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf" }, { "name": "34009", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/34009" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01" }, { "name": "108756", "refsource": "OSVDB", "url": "http://osvdb.org/show/osvdb/108756" }, { "name": "http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2014-3888", "datePublished": "2014-07-10T10:00:00", "dateReserved": "2014-05-27T00:00:00", "dateUpdated": "2024-08-06T10:57:17.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8838
Vulnerability from cvelistv5
Published
2018-04-17 21:00
Modified
2024-09-17 00:30
Severity ?
EPSS score ?
Summary
A weakness in access controls in CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, CENTUM CS 3000 Small versions R3.09.50 and earlier, CENTUM VP versions R6.03.10 and earlier, CENTUM VP Small versions R6.03.10 and earlier, CENTUM VP Basic versions R6.03.10 and earlier, Exaopc versions R3.75.00 and earlier, B/M9000 CS all versions, and B/M9000 VP versions R8.01.01 and earlier may allow a local attacker to exploit the message management function of the system. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H).
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ICS-CERT | Yokogawa CENTUM and Exaopc |
Version: CENTUM series CENTUM CS 1000 all versions CENTUM CS 3000 versions R3.09.50 and prior CENTUM CS 3000 Small versions R3.09.50 and prior CENTUM VP versions R6.03.10 and prior CENTUM VP Small versions R6.03.10 and prior CENTUM VP Basic versions R6.03.10 and prior Exaopc versions R3.75.00 and prior B/M9000 CS all versions and B/M9000 VP versions R8.01.01 and prior. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Yokogawa CENTUM and Exaopc", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "CENTUM series CENTUM CS 1000 all versions CENTUM CS 3000 versions R3.09.50 and prior CENTUM CS 3000 Small versions R3.09.50 and prior CENTUM VP versions R6.03.10 and prior CENTUM VP Small versions R6.03.10 and prior CENTUM VP Basic versions R6.03.10 and prior Exaopc versions R3.75.00 and prior B/M9000 CS all versions and B/M9000 VP versions R8.01.01 and prior." } ] } ], "datePublic": "2018-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A weakness in access controls in CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, CENTUM CS 3000 Small versions R3.09.50 and earlier, CENTUM VP versions R6.03.10 and earlier, CENTUM VP Small versions R6.03.10 and earlier, CENTUM VP Basic versions R6.03.10 and earlier, Exaopc versions R3.75.00 and earlier, B/M9000 CS all versions, and B/M9000 VP versions R8.01.01 and earlier may allow a local attacker to exploit the message management function of the system. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H)." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T20:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-12T00:00:00", "ID": "CVE-2018-8838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Yokogawa CENTUM and Exaopc", "version": { "version_data": [ { "version_value": "CENTUM series CENTUM CS 1000 all versions CENTUM CS 3000 versions R3.09.50 and prior CENTUM CS 3000 Small versions R3.09.50 and prior CENTUM VP versions R6.03.10 and prior CENTUM VP Small versions R6.03.10 and prior CENTUM VP Basic versions R6.03.10 and prior Exaopc versions R3.75.00 and prior B/M9000 CS all versions and B/M9000 VP versions R8.01.01 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A weakness in access controls in CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, CENTUM CS 3000 Small versions R3.09.50 and earlier, CENTUM VP versions R6.03.10 and earlier, CENTUM VP Small versions R6.03.10 and earlier, CENTUM VP Basic versions R6.03.10 and earlier, Exaopc versions R3.75.00 and earlier, B/M9000 CS all versions, and B/M9000 VP versions R8.01.01 and earlier may allow a local attacker to exploit the message management function of the system. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permissions, Privileges, and Access Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-8838", "datePublished": "2018-04-17T21:00:00Z", "dateReserved": "2018-03-20T00:00:00", "dateUpdated": "2024-09-17T00:30:30.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5627
Vulnerability from cvelistv5
Published
2020-02-05 18:45
Modified
2024-08-06 06:59
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet.
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | x_refsource_MISC | |
http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Yokogawa | CENTUM CS 1000 |
Version: R3.08.70 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:02.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 1000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.08.70 and earlier" } ] }, { "product": "CENTUM CS 3000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM CS 3000 Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "CENTUM VP Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "ProSafe-RS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.02.10 and earlier" } ] }, { "product": "Exaopc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.72.00 and earlier" } ] }, { "product": "Exaquantum", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.85.00 and earlier" } ] }, { "product": "Exaquantum/Batch", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.50.30 and earlier" } ] }, { "product": "Exapilot", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.96.10 and earlier" } ] }, { "product": "Exaplog", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40.00 and earlier" } ] }, { "product": "Exasmoc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Exarqe", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Field Wireless Device OPC Server", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.01.02 and earlier" } ] }, { "product": "PRM", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.12.00 and earlier" } ] }, { "product": "STARDOM VDS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.30.01 and earlier" } ] }, { "product": "STARDOM OPC Server for Windows", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40 and earlier" } ] }, { "product": "FAST/TOOLS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R10.01 and earlier" } ] }, { "product": "B/M9000CS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.05.01 and earlier" } ] }, { "product": "B/M9000 VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.03.04 and earlier" } ] }, { "product": "FieldMate", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R1.01" }, { "status": "affected", "version": "R1.02" } ] } ], "datePublic": "2015-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:45:58", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 1000", "version": { "version_data": [ { "version_value": "R3.08.70 and earlier" } ] } }, { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM CS 3000 Entry", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "CENTUM VP Entry", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "ProSafe-RS", "version": { "version_data": [ { "version_value": "R3.02.10 and earlier" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "R3.72.00 and earlier" } ] } }, { "product_name": "Exaquantum", "version": { "version_data": [ { "version_value": "R2.85.00 and earlier" } ] } }, { "product_name": "Exaquantum/Batch", "version": { "version_data": [ { "version_value": "R2.50.30 and earlier" } ] } }, { "product_name": "Exapilot", "version": { "version_data": [ { "version_value": "R3.96.10 and earlier" } ] } }, { "product_name": "Exaplog", "version": { "version_data": [ { "version_value": "R3.40.00 and earlier" } ] } }, { "product_name": "Exasmoc", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Exarqe", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Field Wireless Device OPC Server", "version": { "version_data": [ { "version_value": "R2.01.02 and earlier" } ] } }, { "product_name": "PRM", "version": { "version_data": [ { "version_value": "R3.12.00 and earlier" } ] } }, { "product_name": "STARDOM VDS", "version": { "version_data": [ { "version_value": "R7.30.01 and earlier" } ] } }, { "product_name": "STARDOM OPC Server for Windows", "version": { "version_data": [ { "version_value": "R3.40 and earlier" } ] } }, { "product_name": "FAST/TOOLS", "version": { "version_data": [ { "version_value": "R10.01 and earlier" } ] } }, { "product_name": "B/M9000CS", "version": { "version_data": [ { "version_value": "R5.05.01 and earlier" } ] } }, { "product_name": "B/M9000 VP", "version": { "version_data": [ { "version_value": "R7.03.04 and earlier" } ] } }, { "product_name": "FieldMate", "version": { "version_data": [ { "version_value": "R1.01" }, { "version_value": "R1.02" } ] } } ] }, "vendor_name": "Yokogawa" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-5627", "datePublished": "2020-02-05T18:45:58", "dateReserved": "2015-07-24T00:00:00", "dateUpdated": "2024-08-06T06:59:02.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30707
Vulnerability from cvelistv5
Published
2022-06-28 10:05
Modified
2024-08-03 06:56
Severity ?
EPSS score ?
Summary
Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration.
References
▼ | URL | Tags |
---|---|---|
https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf | x_refsource_MISC | |
https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU92819891/index.html | x_refsource_MISC | |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Yokogawa Electric Corporation | CAMS for HIS |
Version: CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:56:13.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU92819891/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CAMS for HIS", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 \u0027For CENTUM VP Support CAMS for HIS\u0027 is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01" } ] } ], "descriptions": [ { "lang": "en", "value": "Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 \u0027For CENTUM VP Support CAMS for HIS\u0027 is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration." } ], "problemTypes": [ { "descriptions": [ { "description": "Violation of Secure Design Principles", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-28T10:05:59", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU92819891/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-30707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CAMS for HIS", "version": { "version_data": [ { "version_value": "CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 \u0027For CENTUM VP Support CAMS for HIS\u0027 is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 \u0027For CENTUM VP Support CAMS for HIS\u0027 is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Violation of Secure Design Principles" } ] } ] }, "references": { "reference_data": [ { "name": "https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf" }, { "name": "https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf", "refsource": "MISC", "url": "https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf" }, { "name": "https://jvn.jp/vu/JVNVU92819891/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU92819891/index.html" }, { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-30707", "datePublished": "2022-06-28T10:05:59", "dateReserved": "2022-06-06T00:00:00", "dateUpdated": "2024-08-03T06:56:13.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0782
Vulnerability from cvelistv5
Published
2014-05-16 10:00
Modified
2024-08-06 09:27
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.
References
▼ | URL | Tags |
---|---|---|
http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:27:19.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-16T02:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2014-0782", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf" }, { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2014-0782", "datePublished": "2014-05-16T10:00:00", "dateReserved": "2014-01-02T00:00:00", "dateUpdated": "2024-08-06T09:27:19.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5628
Vulnerability from cvelistv5
Published
2020-02-05 18:46
Modified
2024-08-06 06:59
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet.
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | x_refsource_MISC | |
http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Yokogawa | CENTUM CS 1000 |
Version: R3.08.70 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:02.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM CS 1000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.08.70 and earlier" } ] }, { "product": "CENTUM CS 3000", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM CS 3000 Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.09.50 and earlier" } ] }, { "product": "CENTUM VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "CENTUM VP Entry", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.04.20 and earlier" } ] }, { "product": "ProSafe-RS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.02.10 and earlier" } ] }, { "product": "Exaopc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.72.00 and earlier" } ] }, { "product": "Exaquantum", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.85.00 and earlier" } ] }, { "product": "Exaquantum/Batch", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.50.30 and earlier" } ] }, { "product": "Exapilot", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.96.10 and earlier" } ] }, { "product": "Exaplog", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40.00 and earlier" } ] }, { "product": "Exasmoc", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Exarqe", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R4.03.20 and earlier" } ] }, { "product": "Field Wireless Device OPC Server", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R2.01.02 and earlier" } ] }, { "product": "PRM", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.12.00 and earlier" } ] }, { "product": "STARDOM VDS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.30.01 and earlier" } ] }, { "product": "STARDOM OPC Server for Windows", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R3.40 and earlier" } ] }, { "product": "FAST/TOOLS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R10.01 and earlier" } ] }, { "product": "B/M9000CS", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R5.05.01 and earlier" } ] }, { "product": "B/M9000 VP", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R7.03.04 and earlier" } ] }, { "product": "FieldMate", "vendor": "Yokogawa", "versions": [ { "status": "affected", "version": "R1.01" }, { "status": "affected", "version": "R1.02" } ] } ], "datePublic": "2015-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-05T18:46:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM CS 1000", "version": { "version_data": [ { "version_value": "R3.08.70 and earlier" } ] } }, { "product_name": "CENTUM CS 3000", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM CS 3000 Entry", "version": { "version_data": [ { "version_value": "R3.09.50 and earlier" } ] } }, { "product_name": "CENTUM VP", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "CENTUM VP Entry", "version": { "version_data": [ { "version_value": "R5.04.20 and earlier" } ] } }, { "product_name": "ProSafe-RS", "version": { "version_data": [ { "version_value": "R3.02.10 and earlier" } ] } }, { "product_name": "Exaopc", "version": { "version_data": [ { "version_value": "R3.72.00 and earlier" } ] } }, { "product_name": "Exaquantum", "version": { "version_data": [ { "version_value": "R2.85.00 and earlier" } ] } }, { "product_name": "Exaquantum/Batch", "version": { "version_data": [ { "version_value": "R2.50.30 and earlier" } ] } }, { "product_name": "Exapilot", "version": { "version_data": [ { "version_value": "R3.96.10 and earlier" } ] } }, { "product_name": "Exaplog", "version": { "version_data": [ { "version_value": "R3.40.00 and earlier" } ] } }, { "product_name": "Exasmoc", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Exarqe", "version": { "version_data": [ { "version_value": "R4.03.20 and earlier" } ] } }, { "product_name": "Field Wireless Device OPC Server", "version": { "version_data": [ { "version_value": "R2.01.02 and earlier" } ] } }, { "product_name": "PRM", "version": { "version_data": [ { "version_value": "R3.12.00 and earlier" } ] } }, { "product_name": "STARDOM VDS", "version": { "version_data": [ { "version_value": "R7.30.01 and earlier" } ] } }, { "product_name": "STARDOM OPC Server for Windows", "version": { "version_data": [ { "version_value": "R3.40 and earlier" } ] } }, { "product_name": "FAST/TOOLS", "version": { "version_data": [ { "version_value": "R10.01 and earlier" } ] } }, { "product_name": "B/M9000CS", "version": { "version_data": [ { "version_value": "R5.05.01 and earlier" } ] } }, { "product_name": "B/M9000 VP", "version": { "version_data": [ { "version_value": "R7.03.04 and earlier" } ] } }, { "product_name": "FieldMate", "version": { "version_data": [ { "version_value": "R1.01" }, { "version_value": "R1.02" } ] } } ] }, "vendor_name": "Yokogawa" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "name": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf", "refsource": "CONFIRM", "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-5628", "datePublished": "2020-02-05T18:46:01", "dateReserved": "2015-07-24T00:00:00", "dateUpdated": "2024-08-06T06:59:02.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26593
Vulnerability from cvelistv5
Published
2023-04-11 00:00
Modified
2024-08-02 11:53
Severity ?
EPSS score ?
Summary
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Yokogawa Electric Corporation | CENTUM series |
Version: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/vu/JVNVU98775218/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM series", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later" } ] } ], "descriptions": [ { "lang": "en", "value": "CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later" } ], "problemTypes": [ { "descriptions": [ { "description": "Cleartext storage of sensitive information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T00:00:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "url": "https://jvn.jp/en/vu/JVNVU98775218/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-26593", "datePublished": "2023-04-11T00:00:00", "dateReserved": "2023-03-15T00:00:00", "dateUpdated": "2024-08-02T11:53:53.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26034
Vulnerability from cvelistv5
Published
2022-04-15 01:45
Modified
2024-08-03 04:56
Severity ?
EPSS score ?
Summary
Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server.
References
▼ | URL | Tags |
---|---|---|
https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/ | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU99204686/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Yokogawa Electric Corporation | CENTUM VP series with VP6E5000(AD Suite Engineering ServerFunction) installed and B/M9000 VP |
Version: CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CENTUM VP series with VP6E5000(AD Suite Engineering ServerFunction) installed and B/M9000 VP", "vendor": "Yokogawa Electric Corporation", "versions": [ { "status": "affected", "version": "CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authentication", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-15T01:45:21", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2022-26034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CENTUM VP series with VP6E5000(AD Suite Engineering ServerFunction) installed and B/M9000 VP", "version": { "version_data": [ { "version_value": "CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01" } ] } } ] }, "vendor_name": "Yokogawa Electric Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/", "refsource": "MISC", "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "name": "https://jvn.jp/vu/JVNVU99204686/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU99204686/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-26034", "datePublished": "2022-04-15T01:45:21", "dateReserved": "2022-04-01T00:00:00", "dateUpdated": "2024-08-03T04:56:37.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-04-11 09:15
Modified
2024-11-21 07:51
Severity ?
Summary
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yokogawa | b\/m9000_vp | * | |
yokogawa | b\/m9000_vp | * | |
yokogawa | b\/m9000cs | * | |
yokogawa | centum_cs_1000 | * | |
yokogawa | centum_cs_3000 | * | |
yokogawa | centum_cs_3000_entry_class | * | |
yokogawa | centum_vp | * | |
yokogawa | centum_vp | * | |
yokogawa | centum_vp | * | |
yokogawa | centum_vp_entry_class | * | |
yokogawa | centum_vp_entry_class | * | |
yokogawa | centum_vp_entry_class | * | |
yokogawa | exaopc | * | |
yokogawa | exaopc | * | |
yokogawa | exaopc | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB7BFFC-DD4C-480F-84C0-552982A0C0CF", "versionEndIncluding": "r7.04.51", "versionStartIncluding": "r6.01.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E598505-F0AB-4752-AFC7-5C64DF26FF8F", "versionStartIncluding": "r8.01.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000cs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F2FE8C0-18CB-4D76-8287-743554CE7C44", "versionEndIncluding": "r5.05.01", "versionStartIncluding": "r5.04.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_1000:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE15C1F0-43CB-45AD-86FA-B6BEB897E88C", "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r2.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "E566F3FA-B3A4-467A-8F9C-A988DCDDABF0", "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r2.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000_entry_class:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A40BBD9-478C-4441-A9E6-953433C547B8", "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r2.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "80CB728F-623F-4284-B337-15A40A8497BD", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "29370D5F-14C3-4A72-B315-F410FED14AB7", "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DAB0E32-C52A-45C5-AE41-90E4BA186FB7", "versionStartIncluding": "r6.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A36B940-A7DF-4388-AB66-9C048525646D", "versionEndIncluding": "r4.02.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:*", "matchCriteriaId": "32B4A888-BFDD-4E51-934B-BD35C584F073", "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F4B8DCD-FE30-486C-A9AD-8BC31F48F7C8", "versionStartIncluding": "r6.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "68410A9F-F9E8-48B5-AAEB-22F64F6195A1", "versionEndIncluding": "r1.20.00", "versionStartIncluding": "r1.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F4A94E-6179-4769-BCB1-F7588BE4763B", "versionEndIncluding": "r2.10.00", "versionStartIncluding": "r2.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B3D8BED-A853-4D07-80E9-A1B46C1F65DA", "versionStartIncluding": "r3.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later" } ], "id": "CVE-2023-26593", "lastModified": "2024-11-21T07:51:49.287", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-11T09:15:08.067", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU98775218/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU98775218/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-04-17 21:29
Modified
2024-11-21 04:14
Severity ?
Summary
A weakness in access controls in CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, CENTUM CS 3000 Small versions R3.09.50 and earlier, CENTUM VP versions R6.03.10 and earlier, CENTUM VP Small versions R6.03.10 and earlier, CENTUM VP Basic versions R6.03.10 and earlier, Exaopc versions R3.75.00 and earlier, B/M9000 CS all versions, and B/M9000 VP versions R8.01.01 and earlier may allow a local attacker to exploit the message management function of the system. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H).
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yokogawa | b\/m9000_cs | - | |
yokogawa | b\/m9000_vp | * | |
yokogawa | centum_cs_3000 | * | |
yokogawa | centum_cs_3000 | * | |
yokogawa | centum_vp | * | |
yokogawa | centum_vp | * | |
yokogawa | centum_vp | * | |
yokogawa | exaopc | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8DF8849-66C6-4FF3-B9FD-C1D7EEDE4700", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EC1F202-975B-4C31-8578-83D812C67530", "versionEndIncluding": "r8.01.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CECD111-9739-48AA-8ABD-D32757AA93CF", "versionEndIncluding": "r3.09.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:small:*:*:*", "matchCriteriaId": "E32288EF-60BC-4C46-9A42-F8A5A42A9671", "versionEndIncluding": "r3.09.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFE3FB77-20D3-4A09-AF35-D76F111C294C", "versionEndIncluding": "r6.03.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:basic:*:*:*", "matchCriteriaId": "FAA2963F-A8E7-42F2-B185-E211D1D83423", "versionEndIncluding": "r6.03.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:small:*:*:*", "matchCriteriaId": "30F2F655-436A-49ED-838D-52ED35C48C10", "versionEndIncluding": "r6.03.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "3252AF18-B13B-4727-B397-91E83ECF7B4C", "versionEndIncluding": "r3.75.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A weakness in access controls in CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, CENTUM CS 3000 Small versions R3.09.50 and earlier, CENTUM VP versions R6.03.10 and earlier, CENTUM VP Small versions R6.03.10 and earlier, CENTUM VP Basic versions R6.03.10 and earlier, Exaopc versions R3.75.00 and earlier, B/M9000 CS all versions, and B/M9000 VP versions R8.01.01 and earlier may allow a local attacker to exploit the message management function of the system. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H)." }, { "lang": "es", "value": "Una debilidad en los controles de acceso en CENTUM CS 1000 en todas las versiones, CENTUM CS 3000 en versiones R3.09.50 y anteriores, CENTUM CS 3000 Small en versiones R3.09.50 y anteriores, CENTUM VP en versiones R6.03.10 y anteriores, CENTUM VP Small en versiones R6.03.10 y anteriores, CENTUM VP Basic en versiones R6.03.10 y anteriores, Exaopc en versiones R3.75.00 y anteriores, B/M9000 CS en todas las versiones y B/M9000 VP en versiones R8.01.01 y anteriores podr\u00eda permitir que un atacante local explote la funci\u00f3n de gesti\u00f3n de mensajes del sistema. Se ha calculado una puntuaci\u00f3n base de CVSS v3 de 6.5; la cadena de vector CVSS es (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H)." } ], "id": "CVE-2018-8838", "lastModified": "2024-11-21T04:14:25.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T21:29:00.343", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-05 19:15
Modified
2024-11-21 02:33
Severity ?
Summary
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | Not Applicable | |
vultures@jpcert.or.jp | https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C1B8CF6-8FC2-4E3A-AB76-73E987726C0E", "versionEndIncluding": "r3.08.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7E67CC9-AE79-4CEC-8B35-C191EB32760C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B0B579-F479-488F-8E62-DA698E2DA33F", "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "111B964C-8A95-4751-829C-A5EEB0801D0A", "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BFCAD6-7540-4279-92C5-9ADAB35CD4A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CACAE33-FBCD-4C71-80F4-A0533846C41E", "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6BA4DF1-5E0C-4E6D-9EF3-71A0CD57DB09", "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E37ECBA-48F6-456A-AE49-83347A91208B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:prosafe-rs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA1C8F8A-D82A-483E-958F-C210D6B152B7", "versionEndIncluding": "r3.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:prosafe-rs:-:*:*:*:*:*:*:*", "matchCriteriaId": "16AC20D0-9D4F-42BF-B308-03343603CC3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "036843EA-6A69-411E-B0F5-FFA710E7C1AD", "versionEndIncluding": "r3.72.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exapilot:*:*:*:*:*:*:*:*", "matchCriteriaId": "37D42D7A-D6E5-445F-B82B-E891DB489BC0", "versionEndIncluding": "r3.96.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaplog:*:*:*:*:*:*:*:*", "matchCriteriaId": "93B26B69-6D27-4123-8B98-A64F649488AF", "versionEndIncluding": "r3.40.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaquantum:*:*:*:*:*:*:*:*", "matchCriteriaId": "567F1E51-190B-4C7E-AB51-9E78D028C4C1", "versionEndIncluding": "r2.85.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaquantum\\/batch:*:*:*:*:*:*:*:*", "matchCriteriaId": "F434B396-76F3-43A0-BD20-8D43E78279DC", "versionEndIncluding": "r2.50.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exarqe:*:*:*:*:*:*:*:*", "matchCriteriaId": "99EEE22E-7C6E-4B0C-92CC-542BE80CEA5E", "versionEndIncluding": "r4.03.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exasmoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AFC7E5E-37A1-43B3-9276-F37B7B8708B7", "versionEndIncluding": "r4.03.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:field_wireless_device_opc_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5C6FDC-2AB5-461D-AB7B-FAD56A5BFD05", "versionEndIncluding": "r2.01.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:field_wireless_device_opc_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "29DE5CB8-1677-40D3-B0F9-F2783F264715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D3A931F-E772-43FB-A771-76979044326F", "versionEndIncluding": "r3.12.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:scada_software_\\(fast\\/tools\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "B0899439-BF70-4511-87CA-98AC62EBF40D", "versionEndIncluding": "r10.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:versatile_data_server_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F29F7E5-54B9-4738-B8E5-B0E618C907BA", "versionEndIncluding": "r7.30.01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26466967-050B-4875-B2CD-BB918E33A7DC", "versionEndIncluding": "r5.05.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6C0600F-87E0-4CE5-ACB9-49F160DB3D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63546CAB-2A76-4974-8B11-9893B7EC01E8", "versionEndIncluding": "r7.03.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "59BD08BA-2C44-4BD0-BAA1-AC9D304E2DAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:fieldmate:r1.01:*:*:*:*:*:*:*", "matchCriteriaId": "EAD722C9-63AD-4A71-8916-0B27956420C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:fieldmate:r1.02:*:*:*:*:*:*:*", "matchCriteriaId": "EEB2F7A7-847B-4C3E-B128-CAC09BF828CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_opc_server:*:*:*:*:*:windows:*:*", "matchCriteriaId": "849A4355-8BF5-41E8-92B6-FCF28DFA2692", "versionEndIncluding": "r3.40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_opc_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE5D11B-6877-4390-B9F6-6610761DB902", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en Yokogawa CENTUM CS 1000 versiones R3.08.70 y anteriores, CENTUM CS 3000 versiones R3.09.50 y anteriores, CENTUM CS 3000 Entry versiones R3.09.50 y anteriores, CENTUM VP versiones R5.04.20 y anteriores, CENTUM VP Entry versiones R5.04.20 y anteriores, ProSafe-RS versiones R3.02.10 y anteriores, Exaopc versiones R3.72.00 y anteriores, Exaquantum versiones R2.85.00 y anteriores, Exaquantum/Batch versiones R2.50.30 y anteriores, Exapilot versiones R3.96.10 y anteriores, Exaplog versiones R3.40.00 y anteriores, Exasmoc versiones R4.03.20 y anteriores, Exarqe versiones R4.03.20 y anteriores, Field Wireless Device OPC Server versiones R2.01.02 y anteriores, PRM versiones R3.12.00 y anteriores, STARDOM VDS versiones R7.30.01 y anteriores, STARDOM OPC Server for Windows versiones R3.40 y anteriores, FAST/TOOLS versiones R10.01 y anteriores, B/M9000CS versiones R5.05.01 y anteriores, B/M9000 VP versiones R7.03.04 y anteriores, y FieldMate versiones R1.01 o R1.02, permite a atacantes remotos causar una denegaci\u00f3n de servicio (interrupci\u00f3n de comunicaciones de red) por medio de un paquete dise\u00f1ado." } ], "id": "CVE-2015-5626", "lastModified": "2024-11-21T02:33:26.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-05T19:15:10.240", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Not Applicable" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-05 19:15
Modified
2024-11-21 02:33
Severity ?
Summary
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | Not Applicable | |
vultures@jpcert.or.jp | https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C1B8CF6-8FC2-4E3A-AB76-73E987726C0E", "versionEndIncluding": "r3.08.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7E67CC9-AE79-4CEC-8B35-C191EB32760C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B0B579-F479-488F-8E62-DA698E2DA33F", "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "111B964C-8A95-4751-829C-A5EEB0801D0A", "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BFCAD6-7540-4279-92C5-9ADAB35CD4A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CACAE33-FBCD-4C71-80F4-A0533846C41E", "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6BA4DF1-5E0C-4E6D-9EF3-71A0CD57DB09", "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E37ECBA-48F6-456A-AE49-83347A91208B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:prosafe-rs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA1C8F8A-D82A-483E-958F-C210D6B152B7", "versionEndIncluding": "r3.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:prosafe-rs:-:*:*:*:*:*:*:*", "matchCriteriaId": "16AC20D0-9D4F-42BF-B308-03343603CC3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "036843EA-6A69-411E-B0F5-FFA710E7C1AD", "versionEndIncluding": "r3.72.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exapilot:*:*:*:*:*:*:*:*", "matchCriteriaId": "37D42D7A-D6E5-445F-B82B-E891DB489BC0", "versionEndIncluding": "r3.96.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaplog:*:*:*:*:*:*:*:*", "matchCriteriaId": "93B26B69-6D27-4123-8B98-A64F649488AF", "versionEndIncluding": "r3.40.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaquantum:*:*:*:*:*:*:*:*", "matchCriteriaId": "567F1E51-190B-4C7E-AB51-9E78D028C4C1", "versionEndIncluding": "r2.85.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaquantum\\/batch:*:*:*:*:*:*:*:*", "matchCriteriaId": "F434B396-76F3-43A0-BD20-8D43E78279DC", "versionEndIncluding": "r2.50.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exarqe:*:*:*:*:*:*:*:*", "matchCriteriaId": "99EEE22E-7C6E-4B0C-92CC-542BE80CEA5E", "versionEndIncluding": "r4.03.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exasmoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AFC7E5E-37A1-43B3-9276-F37B7B8708B7", "versionEndIncluding": "r4.03.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:field_wireless_device_opc_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5C6FDC-2AB5-461D-AB7B-FAD56A5BFD05", "versionEndIncluding": "r2.01.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:field_wireless_device_opc_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "29DE5CB8-1677-40D3-B0F9-F2783F264715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D3A931F-E772-43FB-A771-76979044326F", "versionEndIncluding": "r3.12.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:scada_software_\\(fast\\/tools\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "B0899439-BF70-4511-87CA-98AC62EBF40D", "versionEndIncluding": "r10.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:versatile_data_server_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F29F7E5-54B9-4738-B8E5-B0E618C907BA", "versionEndIncluding": "r7.30.01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26466967-050B-4875-B2CD-BB918E33A7DC", "versionEndIncluding": "r5.05.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6C0600F-87E0-4CE5-ACB9-49F160DB3D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63546CAB-2A76-4974-8B11-9893B7EC01E8", "versionEndIncluding": "r7.03.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "59BD08BA-2C44-4BD0-BAA1-AC9D304E2DAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:fieldmate:r1.01:*:*:*:*:*:*:*", "matchCriteriaId": "EAD722C9-63AD-4A71-8916-0B27956420C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:fieldmate:r1.02:*:*:*:*:*:*:*", "matchCriteriaId": "EEB2F7A7-847B-4C3E-B128-CAC09BF828CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_opc_server:*:*:*:*:*:windows:*:*", "matchCriteriaId": "849A4355-8BF5-41E8-92B6-FCF28DFA2692", "versionEndIncluding": "r3.40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_opc_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE5D11B-6877-4390-B9F6-6610761DB902", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en Yokogawa CENTUM CS 1000 versiones R3.08.70 y anteriores, CENTUM CS 3000 versiones R3.09.50 y anteriores, CENTUM CS 3000 Entry versiones R3.09.50 y anteriores, CENTUM VP versiones R5.04.20 y anteriores, CENTUM VP Entry versiones R5.04.20 y anteriores, ProSafe-RS versiones R3.02.10 y anteriores, Exaopc versiones R3.72.00 y anteriores, Exaquantum versiones R2.85.00 y anteriores, Exaquantum/Batch versiones R2.50.30 y anteriores, Exapilot versiones R3.96.10 y anteriores, Exaplog versiones R3.40.00 y anteriores, Exasmoc versiones R4.03.20 y anteriores, Exarqe versiones R4.03.20 y anteriores, Field Wireless Device OPC Server versiones R2.01.02 y anteriores, PRM versiones R3.12.00 y anteriores, STARDOM VDS versiones R7.30.01 y anteriores, STARDOM OPC Server for Windows versiones R3.40 y anteriores, FAST/TOOLS versiones R10.01 y anteriores, B/M9000CS versiones R5.05.01 y anteriores, B/M9000 VP versiones R7.03.04 y anteriores, y FieldMate versiones R1.01 o R1.02, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un paquete dise\u00f1ado." } ], "id": "CVE-2015-5628", "lastModified": "2024-11-21T02:33:27.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-05T19:15:10.397", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Not Applicable" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-05 19:15
Modified
2024-11-21 02:33
Severity ?
Summary
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | Not Applicable | |
vultures@jpcert.or.jp | https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 | Mitigation, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C1B8CF6-8FC2-4E3A-AB76-73E987726C0E", "versionEndIncluding": "r3.08.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7E67CC9-AE79-4CEC-8B35-C191EB32760C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48B0B579-F479-488F-8E62-DA698E2DA33F", "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "111B964C-8A95-4751-829C-A5EEB0801D0A", "versionEndIncluding": "r3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*", "matchCriteriaId": "67BFCAD6-7540-4279-92C5-9ADAB35CD4A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CACAE33-FBCD-4C71-80F4-A0533846C41E", "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6BA4DF1-5E0C-4E6D-9EF3-71A0CD57DB09", "versionEndIncluding": "r5.04.20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E37ECBA-48F6-456A-AE49-83347A91208B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:prosafe-rs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA1C8F8A-D82A-483E-958F-C210D6B152B7", "versionEndIncluding": "r3.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:prosafe-rs:-:*:*:*:*:*:*:*", "matchCriteriaId": "16AC20D0-9D4F-42BF-B308-03343603CC3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "036843EA-6A69-411E-B0F5-FFA710E7C1AD", "versionEndIncluding": "r3.72.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exapilot:*:*:*:*:*:*:*:*", "matchCriteriaId": "37D42D7A-D6E5-445F-B82B-E891DB489BC0", "versionEndIncluding": "r3.96.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaplog:*:*:*:*:*:*:*:*", "matchCriteriaId": "93B26B69-6D27-4123-8B98-A64F649488AF", "versionEndIncluding": "r3.40.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaquantum:*:*:*:*:*:*:*:*", "matchCriteriaId": "567F1E51-190B-4C7E-AB51-9E78D028C4C1", "versionEndIncluding": "r2.85.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaquantum\\/batch:*:*:*:*:*:*:*:*", "matchCriteriaId": "F434B396-76F3-43A0-BD20-8D43E78279DC", "versionEndIncluding": "r2.50.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exarqe:*:*:*:*:*:*:*:*", "matchCriteriaId": "99EEE22E-7C6E-4B0C-92CC-542BE80CEA5E", "versionEndIncluding": "r4.03.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exasmoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AFC7E5E-37A1-43B3-9276-F37B7B8708B7", "versionEndIncluding": "r4.03.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:field_wireless_device_opc_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5C6FDC-2AB5-461D-AB7B-FAD56A5BFD05", "versionEndIncluding": "r2.01.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:field_wireless_device_opc_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "29DE5CB8-1677-40D3-B0F9-F2783F264715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D3A931F-E772-43FB-A771-76979044326F", "versionEndIncluding": "r3.12.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:scada_software_\\(fast\\/tools\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "B0899439-BF70-4511-87CA-98AC62EBF40D", "versionEndIncluding": "r10.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:versatile_data_server_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F29F7E5-54B9-4738-B8E5-B0E618C907BA", "versionEndIncluding": "r7.30.01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000cs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26466967-050B-4875-B2CD-BB918E33A7DC", "versionEndIncluding": "r5.05.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6C0600F-87E0-4CE5-ACB9-49F160DB3D33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:b\\/m9000_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63546CAB-2A76-4974-8B11-9893B7EC01E8", "versionEndIncluding": "r7.03.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "59BD08BA-2C44-4BD0-BAA1-AC9D304E2DAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:fieldmate:r1.01:*:*:*:*:*:*:*", "matchCriteriaId": "EAD722C9-63AD-4A71-8916-0B27956420C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:fieldmate:r1.02:*:*:*:*:*:*:*", "matchCriteriaId": "EEB2F7A7-847B-4C3E-B128-CAC09BF828CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:stardom_opc_server:*:*:*:*:*:windows:*:*", "matchCriteriaId": "849A4355-8BF5-41E8-92B6-FCF28DFA2692", "versionEndIncluding": "r3.40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:stardom_opc_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EE5D11B-6877-4390-B9F6-6610761DB902", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en Yokogawa CENTUM CS 1000 versiones R3.08.70 y anteriores, CENTUM CS 3000 versiones R3.09.50 y anteriores, CENTUM CS 3000 Entry versiones R3.09.50 y anteriores, CENTUM VP versiones R5.04.20 y anteriores, CENTUM VP Entry versiones R5.04.20 y anteriores, ProSafe-RS versiones R3.02.10 y anteriores, Exaopc versiones R3.72.00 y anteriores, Exaquantum versiones R2.85.00 y anteriores, Exaquantum/Batch versiones R2.50.30 y anteriores, Exapilot versiones R3.96.10 y anteriores, Exaplog versiones R3.40.00 y anteriores, Exasmoc versiones R4.03.20 y anteriores, Exarqe versiones R4.03.20 y anteriores, Field Wireless Device OPC Server versiones R2.01.02 y anteriores, PRM versiones R3.12.00 y anteriores, STARDOM VDS versiones R7.30.01 y anteriores, STARDOM OPC Server for Windows versiones R3.40 y anteriores, FAST/TOOLS versiones R10.01 y anteriores, B/M9000CS versiones R5.05.01 y anteriores, B/M9000 VP versiones R7.03.04 y anteriores, y FieldMate versiones R1.01 o R1.02, permite a atacantes remotos causar una denegaci\u00f3n de servicio (interrupci\u00f3n del proceso) por medio de un paquete dise\u00f1ado." } ], "id": "CVE-2015-5627", "lastModified": "2024-11-21T02:33:26.893", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-05T19:15:10.350", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Not Applicable" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-16 11:12
Modified
2024-11-21 02:02
Severity ?
Summary
Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01 | US Government Resource | |
ics-cert@hq.dhs.gov | http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000cs_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "B08DC609-2458-419B-BC7C-ED97E126E476", "versionEndIncluding": "5.05.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6C0600F-87E0-4CE5-ACB9-49F160DB3D33", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_cs_1000_software:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBB5E05-B97C-47BF-9D96-ED5B2B40C978", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7E67CC9-AE79-4CEC-8B35-C191EB32760C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B32F16C-DDF7-4D36-9C2F-28360378C056", "versionEndIncluding": "2.23.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000_entry_class_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B45F61B-53C2-4FE4-B2E9-62130E15948D", "versionEndIncluding": "3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF69433-979D-470A-85E5-4734E5998F63", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "32141043-016F-4CC0-8CDD-F1004C8BDCEE", "versionEndIncluding": "3.71.02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D447032-B9EA-4FDF-A61B-DD5D2BAF6910", "versionEndIncluding": "7.03.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "59BD08BA-2C44-4BD0-BAA1-AC9D304E2DAF", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_vp_entry_class_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC1C581A-7E30-442A-898B-76C0E35B8376", "versionEndIncluding": "5.03.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D1FD75F-66BF-423E-A491-E5689C7B6AEF", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_vp_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD0FEDD5-351D-466D-B2E9-0A8D4BBF575B", "versionEndIncluding": "4.03.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet." }, { "lang": "es", "value": "Desbordamiento de buffer basado en pila en BKESimmgr.exe en el paquete Expanded Test Functions en Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 y anteriores, CENTUM VP R5.03.00 y anteriores, CENTUM VP Entry Class R5.03.00 y anteriores, Exaopc R3.71.02 y anteriores, B/M9000CS R5.05.01 y anteriores y B/M9000 VP R7.03.01 y anteriores permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado." } ], "id": "CVE-2014-0782", "lastModified": "2024-11-21T02:02:47.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-16T11:12:00.243", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Vendor Advisory" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-10 11:06
Modified
2024-11-21 02:09
Severity ?
Summary
Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yokogawa | exaopc | * | |
yokogawa | exaopc | 3.71.02 | |
yokogawa | b\/m9000cs_software | * | |
yokogawa | b\/m9000cs | - | |
yokogawa | centum_vp_entry_class_software | * | |
yokogawa | centum_vp_entry_class | - | |
yokogawa | centum_vp_software | * | |
yokogawa | centum_vp_software | 4.03.00 | |
yokogawa | centum_vp | - | |
yokogawa | b\/m9000_vp_software | * | |
yokogawa | b\/m9000_vp | - | |
yokogawa | centum_cs_3000 | r3.01 | |
yokogawa | centum_cs_3000 | r3.02 | |
yokogawa | centum_cs_3000 | r3.03 | |
yokogawa | centum_cs_3000 | r3.04 | |
yokogawa | centum_cs_3000 | r3.05 | |
yokogawa | centum_cs_3000 | r3.06 | |
yokogawa | centum_cs_3000 | r3.07 | |
yokogawa | centum_cs_3000 | r3.08 | |
yokogawa | centum_cs_3000 | r3.08.50 | |
yokogawa | centum_cs_3000 | r3.08.70 | |
yokogawa | centum_cs_3000 | r3.09 | |
yokogawa | centum_cs_3000 | r3.09.50 | |
yokogawa | centum_cs_3000_software | * | |
yokogawa | centum_cs_3000 | - | |
yokogawa | centum_cs_1000_software | - | |
yokogawa | centum_cs_1000 | - | |
yokogawa | centum_cs_3000_entry_class_software | * | |
yokogawa | centum_cs_3000_entry_class | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3E0C7C-986A-4A07-847F-D40D194C8A06", "versionEndIncluding": "3.72.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaopc:3.71.02:*:*:*:*:*:*:*", "matchCriteriaId": "CD8C689E-7952-43A8-82F7-C9FA4591899C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000cs_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "B08DC609-2458-419B-BC7C-ED97E126E476", "versionEndIncluding": "5.05.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6C0600F-87E0-4CE5-ACB9-49F160DB3D33", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_vp_entry_class_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC1C581A-7E30-442A-898B-76C0E35B8376", "versionEndIncluding": "5.03.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D1FD75F-66BF-423E-A491-E5689C7B6AEF", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_vp_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "31AF6BF2-A797-439D-AAC5-A6C4E8D6D34F", "versionEndIncluding": "5.03.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp_software:4.03.00:*:*:*:*:*:*:*", "matchCriteriaId": "41986FD4-F223-4B3C-917F-B132AA082B70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D447032-B9EA-4FDF-A61B-DD5D2BAF6910", "versionEndIncluding": "7.03.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:b\\/m9000_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "59BD08BA-2C44-4BD0-BAA1-AC9D304E2DAF", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*", "matchCriteriaId": "40831829-1F44-439C-9A19-7DAAFD36E32F", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*", "matchCriteriaId": "C4F916DD-24BC-4955-9C30-A52C2A41B69C", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*", "matchCriteriaId": "D660F6DA-8694-4F23-B967-299953DFD293", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*", "matchCriteriaId": "D1A408C8-A7CF-439D-85E5-0DD8056A5908", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*", "matchCriteriaId": "CA37B07D-505E-414A-9E69-E2AAB239CA35", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*", "matchCriteriaId": "32BBCAC6-AB8D-4D68-A5E4-F7FBFC3F4B33", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*", "matchCriteriaId": "BB1B75CD-C0BA-4046-A49E-9903B3B5972C", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*", "matchCriteriaId": "E07B64DB-E820-467B-A603-971970637FB1", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*", "matchCriteriaId": "6813F466-42F8-4013-97A4-DA6E5D7C52F8", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*", "matchCriteriaId": "7B0FEB1C-1427-4875-82C6-7EBD2B262766", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:*", "matchCriteriaId": "1824EC58-BCB1-4876-8729-2B6FF2FF8D1D", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000:r3.09.50:*:*:*:*:*:*:*", "matchCriteriaId": "6B948C6E-88E0-4255-BBFF-06EA3EE3E532", "vulnerable": false }, { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B32F16C-DDF7-4D36-9C2F-28360378C056", "versionEndIncluding": "2.23.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_cs_1000_software:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBB5E05-B97C-47BF-9D96-ED5B2B40C978", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7E67CC9-AE79-4CEC-8B35-C191EB32760C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000_entry_class_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B45F61B-53C2-4FE4-B2E9-62130E15948D", "versionEndIncluding": "3.09.50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF69433-979D-470A-85E5-4734E5998F63", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet." }, { "lang": "es", "value": "Desbordamiento de buffer basado en pila en BKFSim_vhfd.exe en Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 y anteriores, CENTUM VP R5.03.20 y anteriores, Exaopc R3.72.00 y anteriores, B/M9000CS R5.05.01 y anteriores y B/M9000 VP R7.03.01 y anteriores, cuando FCS/Test Function est\u00e1 habilitada, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un paquete manipulado." } ], "id": "CVE-2014-3888", "lastModified": "2024-11-21T02:09:04.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-10T11:06:28.880", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01" }, { "source": "vultures@jpcert.or.jp", "url": "http://osvdb.org/show/osvdb/108756" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://www.exploit-db.com/exploits/34009" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/show/osvdb/108756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/34009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-15 02:15
Modified
2024-11-21 06:55
Severity ?
Summary
OS command injection vulnerability exists in CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02, which may allow an attacker who can access the computer where the affected product is installed to execute an arbitrary OS command by altering a file generated using Graphic Builder.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "97A79A7B-D253-4B7E-A79D-71869700BC0E", "versionEndIncluding": "r6.03.02", "versionStartIncluding": "r6.01.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:-:*:*:*", "matchCriteriaId": "637C22A9-50C1-4978-AA0C-46CAEE098743", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:basic:*:*:*", "matchCriteriaId": "C4D17997-51AE-4051-A042-9293A0A82369", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:small:*:*:*", "matchCriteriaId": "619B1403-1ABB-4AD3-B911-B9999188EAA4", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in CENTUM VP R4.01.00 to R4.03.00, CENTUM VP Small R4.01.00 to R4.03.00, CENTUM VP Basic R4.01.00 to R4.03.00, and B/M9000 VP R6.01.01 to R6.03.02, which may allow an attacker who can access the computer where the affected product is installed to execute an arbitrary OS command by altering a file generated using Graphic Builder." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de inyecci\u00f3n de comandos del Sistema Operativo en CENTUM VP versiones R4.01.00 a R4.03.00, CENTUM VP Small versiones R4.01.00 a R4.03.00, CENTUM VP Basic versiones R4.01.00 a R4.03.00 y B/M9000 VP versiones R6.01.01 a R6.03.02, que puede permitir a un atacante que pueda acceder al ordenador donde est\u00e1 instalado el producto afectado ejecutar un comando arbitrario del Sistema Operativo al alterar un archivo generado con Graphic Builder" } ], "id": "CVE-2022-27188", "lastModified": "2024-11-21T06:55:22.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-15T02:15:08.133", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-28 13:15
Modified
2024-11-21 07:03
Severity ?
Summary
Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 'For CENTUM VP Support CAMS for HIS' is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/vu/JVNVU92819891/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf | Vendor Advisory | |
vultures@jpcert.or.jp | https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf | Vendor Advisory | |
vultures@jpcert.or.jp | https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU92819891/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D7B6EFE-A886-4409-BE19-E67C0057265B", "versionEndIncluding": "r3.09.00", "versionStartIncluding": "r3.08.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_entry_class_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F459A677-FC9F-42C6-A422-A5B8AF036935", "versionEndIncluding": "r3.09.00", "versionStartIncluding": "r3.08.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF69433-979D-470A-85E5-4734E5998F63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0D63842-D6A8-4FA1-B09C-71E9113FF95A", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D647BA49-5A43-437B-8C58-0294A452AF8D", "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "844AD54B-ACAC-40A2-8A03-1536032DFBF3", "versionEndIncluding": "r6.09.00", "versionStartIncluding": "r6.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_entry_class_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA3C914C-C755-42A3-BB6B-495EA1E49D24", "versionEndIncluding": "r4.03.00", "versionStartIncluding": "r4.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_entry_class_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97D7746F-EC59-40B6-9C4F-C214C1E597B2", "versionEndIncluding": "r5.04.20", "versionStartIncluding": "r5.01.00", "vulnerable": true }, { "criteria": "cpe:2.3:o:yokogawa:centum_vp_entry_class_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B55FD93-B02F-4A2B-8CA2-7B243BB11E31", "versionEndIncluding": "r6.09.00", "versionStartIncluding": "r6.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D1FD75F-66BF-423E-A491-E5689C7B6AEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "934616AD-FD83-4311-AA4E-6A2A06C34F08", "versionEndIncluding": "r3.80.00", "versionStartIncluding": "r3.72.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EA76D9D-CBD5-44E0-8462-9E704E8799BA", "versionEndIncluding": "r8.03.01", "versionStartIncluding": "r6.01.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000cs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F2FE8C0-18CB-4D76-8287-743554CE7C44", "versionEndIncluding": "r5.05.01", "versionStartIncluding": "r5.04.01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R4.01.00 to R4.03.00), CENTUM series regardless of the use of CAMS function (CENTUM VP, CENTUM VP Small, and CENTUM VP Basic R5.01.00 to R5.04.20 and R6.01.00 to R6.09.00), Exaopc R3.72.00 to R3.80.00 (only if NTPF100-S6 \u0027For CENTUM VP Support CAMS for HIS\u0027 is installed), B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01). If an adjacent attacker successfully compromises a computer using CAMS for HIS software, they can use credentials from the compromised machine to access data from another machine using CAMS for HIS software. This can lead to a disabling of CAMS for HIS software functions on any affected machines, or information disclosure/alteration." }, { "lang": "es", "value": "Se presenta una violaci\u00f3n de los principios de dise\u00f1o seguro en la comunicaci\u00f3n de CAMS para HIS. Los productos y versiones afectados son: la serie CENTUM en la que est\u00e1 instalado el LHS4800 (CENTUM CS 3000 y CENTUM CS 3000 Small R3.08.10 a R3.09.00), la serie CENTUM en la que se usa la funci\u00f3n CAMS (CENTUM VP, CENTUM VP Small y CENTUM VP Basic R4.01.00 a R4.03. 00), la serie CENTUM independientemente del uso de la funci\u00f3n CAMS (CENTUM VP, CENTUM VP Small y CENTUM VP Basic R5.01.00 a R5.04.20 y R6.01.00 a R6.09.00), Exaopc R3. 72.00 a R3.80.00 (s\u00f3lo si est\u00e1 instalado el NTPF100-S6 \"Para CENTUM soporte VP CAMS para HIS\"), B/M9000 CS R5.04.01 a R5.05.01, y B/M9000 VP R6.01.01 a R8.03.01). Si un atacante adyacente logra comprometer un ordenador usando el software CAMS for HIS, puede usar las credenciales de la m\u00e1quina comprometida para acceder a los datos de otra m\u00e1quina que use el software CAMS for HIS. Esto puede conllevar a una inhabilitaci\u00f3n de las funciones del software CAMS for HIS en cualquier m\u00e1quina afectada, o la divulgaci\u00f3n/alteraci\u00f3n de informaci\u00f3n" } ], "id": "CVE-2022-30707", "lastModified": "2024-11-21T07:03:13.267", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-28T13:15:12.497", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU92819891/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU92819891/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/1/32780/files/YSAR-22-0006-E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/19/32780/files/YSAR-22-0006-J.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-02" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-15 02:15
Modified
2024-11-21 06:53
Severity ?
Summary
Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "25A4BB1E-5174-4D2F-879D-8D3B89D7075A", "versionEndIncluding": "r8.03.01", "versionStartIncluding": "r8.01.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:-:*:*:*", "matchCriteriaId": "9E430419-91C5-4991-9676-4C1B43AB8AE1", "versionEndIncluding": "r6.09.00", "versionStartIncluding": "r6.01.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:basic:*:*:*", "matchCriteriaId": "3CAC058F-AA7C-417C-9BF5-453DFC5E6FC7", "versionEndIncluding": "r06.09.00", "versionStartIncluding": "r6.01.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:small:*:*:*", "matchCriteriaId": "70EE0952-6D89-48D3-ABCB-07FCF3613420", "versionEndIncluding": "r6.09.00", "versionStartIncluding": "r6.01.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server." }, { "lang": "es", "value": "Una vulnerabilidad de autenticaci\u00f3n inapropiada en el protocolo de comunicaci\u00f3n proporcionado por el servidor AD (Automation Design) de CENTUM VP versiones R6.01.10 a R6.09.00, CENTUM VP Small versiones R6.01.10 a R6.09.00, CENTUM VP Basic versiones R6.01.10 a R6.09.00, y B/M9000 VP versiones R8.01.01 a R8.03.01 permite a un atacante usar las funciones proporcionadas por el servidor AD. Esto puede conllevar a un filtrado o manipulaci\u00f3n de los datos administrados por el servidor AD" } ], "id": "CVE-2022-26034", "lastModified": "2024-11-21T06:53:20.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-15T02:15:08.083", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/vu/JVNVU99204686/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-09 23:29
Modified
2024-11-21 03:52
Severity ?
Summary
Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://www.securityfocus.com/bid/106442 | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://jvn.jp/vu/JVNVU93652047/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106442 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU93652047/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yokogawa | centum_cs_3000_firmware | * | |
yokogawa | centum_cs_3000 | - | |
yokogawa | centum_cs_3000_entry_class | * | |
yokogawa | centum_vp_firmware | * | |
yokogawa | centum_vp | - | |
yokogawa | centum_vp_entry_class | * | |
yokogawa | b\/m9000_vp | * | |
yokogawa | exaopc | * | |
yokogawa | fast\/tools | * | |
yokogawa | plant_resource_manager | * | |
yokogawa | prosafe-rs | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3EBF753-16FD-40D3-8EED-D72C32883883", "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r3.05.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_cs_3000_entry_class:*:*:*:*:*:*:*:*", "matchCriteriaId": "B46C20CD-6CA3-4233-BBFF-66E7987C2150", "versionEndIncluding": "r3.09.50", "versionStartIncluding": "r3.05.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1045034-D824-4CC1-9326-EEBA3FB34AAA", "versionEndIncluding": "r6.03.10", "versionStartIncluding": "r4.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*", "matchCriteriaId": "161A4767-228C-4681-9D20-81D9380CE48A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A0FF6A1-E352-4EC5-B34B-2C5276B970C9", "versionEndIncluding": "r6.03.10", "versionStartIncluding": "r4.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8F81F5B-CDB6-4FF2-80CB-D1CA0ABF2C24", "versionEndIncluding": "r8.01.90", "versionStartIncluding": "r6.03.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFDEE53D-6CF1-4DAF-95DE-BE832CC2A9A0", "versionEndIncluding": "r3.75.00", "versionStartIncluding": "r3.10.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:fast\\/tools:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B22E279-3BFE-4F58-A639-7761559A1365", "versionEndIncluding": "r10.02.00", "versionStartIncluding": "r9.02.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C8BD51-4D87-4BDF-AF28-68B327392BEE", "versionEndIncluding": "r3.31.00", "versionStartIncluding": "r2.06.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:yokogawa:prosafe-rs:*:*:*:*:*:*:*:*", "matchCriteriaId": "96B459FD-0656-4E3F-A669-F5D07F60949C", "versionEndIncluding": "r4.02.00", "versionStartIncluding": "r1.02.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver\u0027s communication via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples productos Yokogawa que contienen el controlador Vnet/IP Open Communication (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00) y B/M9000 VP(R6.03.01 - R8.01.90)) permiten que atacantes remotos provoquen una denegaci\u00f3n de servicio (DoS) que podr\u00eda resultar en la detenci\u00f3n de la comunicaci\u00f3n del controlador Vnet/IP Open Communication mediante vectores sin especificar." } ], "id": "CVE-2018-16196", "lastModified": "2024-11-21T03:52:16.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-09T23:29:04.560", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106442" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU93652047/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/vu/JVNVU93652047/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }