CVE-2024-8110 (GCVE-0-2024-8110)
Vulnerability from cvelistv5 – Published: 2024-09-17 02:04 – Updated: 2024-09-17 15:04
VLAI?
Summary
Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer.
If a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart.
If both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable.
Severity ?
7.5 (High)
CWE
- CWE-252 - Unchecked Return Value
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Yokogawa Electric Corporation | Dual-redundant Platform for Computer (PC2CKM) |
Affected:
R1.01.00 , ≤ R2.03.00
(custom)
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:yokogawa:dual-redundant_platform_for_computer_\\(pc2ckm\\):*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dual-redundant_platform_for_computer_\\(pc2ckm\\)",
"vendor": "yokogawa",
"versions": [
{
"lessThanOrEqual": "r2.03.00",
"status": "affected",
"version": "r1.01.00",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8110",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-17T14:57:26.649250Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-17T15:04:05.659Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Dual-redundant Platform for Computer (PC2CKM)",
"vendor": "Yokogawa Electric Corporation",
"versions": [
{
"lessThanOrEqual": "R2.03.00",
"status": "affected",
"version": "R1.01.00",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-09-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer.\u003cbr\u003eIf a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart.\u003cbr\u003eIf both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable."
}
],
"value": "Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer.\nIf a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart.\nIf both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-252",
"description": "CWE-252 Unchecked Return Value",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-17T02:04:53.739Z",
"orgId": "7168b535-132a-4efe-a076-338f829b2eb9",
"shortName": "YokogawaGroup"
},
"references": [
{
"url": "https://web-material3.yokogawa.com/1/36276/files/YSAR-24-0003-E.pdf"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7168b535-132a-4efe-a076-338f829b2eb9",
"assignerShortName": "YokogawaGroup",
"cveId": "CVE-2024-8110",
"datePublished": "2024-09-17T02:04:53.739Z",
"dateReserved": "2024-08-23T01:00:38.184Z",
"dateUpdated": "2024-09-17T15:04:05.659Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer.\\nIf a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart.\\nIf both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable.\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado una vulnerabilidad de denegaci\\u00f3n de servicio (DoS) en Dual-redundant Platform for Computer. Si un equipo en el que est\\u00e1 instalado el producto afectado recibe una gran cantidad de paquetes de difusi\\u00f3n UDP en un per\\u00edodo breve, es posible que ocasionalmente dicho equipo se reinicie. Si tanto el equipo activo como el de reserva se reinician al mismo tiempo, la funcionalidad de ese equipo puede no estar disponible temporalmente.\"}]",
"id": "CVE-2024-8110",
"lastModified": "2024-09-20T12:31:20.110",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-09-17T02:15:49.523",
"references": "[{\"url\": \"https://web-material3.yokogawa.com/1/36276/files/YSAR-24-0003-E.pdf\", \"source\": \"7168b535-132a-4efe-a076-338f829b2eb9\"}]",
"sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-252\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-8110\",\"sourceIdentifier\":\"7168b535-132a-4efe-a076-338f829b2eb9\",\"published\":\"2024-09-17T02:15:49.523\",\"lastModified\":\"2024-09-20T12:31:20.110\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer.\\nIf a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart.\\nIf both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en Dual-redundant Platform for Computer. Si un equipo en el que est\u00e1 instalado el producto afectado recibe una gran cantidad de paquetes de difusi\u00f3n UDP en un per\u00edodo breve, es posible que ocasionalmente dicho equipo se reinicie. Si tanto el equipo activo como el de reserva se reinician al mismo tiempo, la funcionalidad de ese equipo puede no estar disponible temporalmente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"7168b535-132a-4efe-a076-338f829b2eb9\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"7168b535-132a-4efe-a076-338f829b2eb9\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-252\"}]}],\"references\":[{\"url\":\"https://web-material3.yokogawa.com/1/36276/files/YSAR-24-0003-E.pdf\",\"source\":\"7168b535-132a-4efe-a076-338f829b2eb9\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-8110\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-17T14:57:26.649250Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:yokogawa:dual-redundant_platform_for_computer_\\\\(pc2ckm\\\\):*:*:*:*:*:*:*:*\"], \"vendor\": \"yokogawa\", \"product\": \"dual-redundant_platform_for_computer_\\\\(pc2ckm\\\\)\", \"versions\": [{\"status\": \"affected\", \"version\": \"r1.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"r2.03.00\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-17T15:03:58.011Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Yokogawa Electric Corporation\", \"product\": \"Dual-redundant Platform for Computer (PC2CKM)\", \"versions\": [{\"status\": \"affected\", \"version\": \"R1.01.00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R2.03.00\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2024-09-17T00:00:00.000Z\", \"references\": [{\"url\": \"https://web-material3.yokogawa.com/1/36276/files/YSAR-24-0003-E.pdf\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer.\\nIf a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart.\\nIf both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer.\u003cbr\u003eIf a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart.\u003cbr\u003eIf both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-252\", \"description\": \"CWE-252 Unchecked Return Value\"}]}], \"providerMetadata\": {\"orgId\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"shortName\": \"YokogawaGroup\", \"dateUpdated\": \"2024-09-17T02:04:53.739Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-8110\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-17T15:04:05.659Z\", \"dateReserved\": \"2024-08-23T01:00:38.184Z\", \"assignerOrgId\": \"7168b535-132a-4efe-a076-338f829b2eb9\", \"datePublished\": \"2024-09-17T02:04:53.739Z\", \"assignerShortName\": \"YokogawaGroup\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…