Vulnerability identifier: #VU66584
Vulnerability risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
CENTUM VP
Web applications /
Remote management & hosting panels
CENTUM CS 3000
Web applications /
Remote management & hosting panels
CP31
Hardware solutions /
Routers & switches, VoIP, GSM, etc
CP33
Hardware solutions /
Routers & switches, VoIP, GSM, etc
CP345
Hardware solutions /
Routers & switches, VoIP, GSM, etc
CP401
Hardware solutions /
Routers & switches, VoIP, GSM, etc
CP451
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Yokogawa
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application. A remote attacker on the local network can pass specially crafted data to the application and perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
CENTUM VP: R4.01.00 - R6.03.00
CENTUM CS 3000: All versions
CP31: All versions
CP33: All versions
CP345: All versions
CP401: All versions
CP451: All versions
External links
http://jvn.jp/vu/JVNVU94343729/index.html
http://web-material3.yokogawa.com/1/33029/files/YSAR-22-0008-E.pdf
http://web-material3.yokogawa.com/19/33029/files/YSAR-22-0008-J.pdf
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.