Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Yokogawa Group

#7168b535-132a-4efe-a076-338f829b2eb9
Policy

Short Name

YokogawaGroup

Program Role

CNA

Root

JPCERT/CC

Top Level Root

MITRE Corporation

Security Advisories

View Yokogawa Electric Corporation Advisories
View Yokogawa Test & Measurement Corporation Advisories

Domain

yokogawa.com

Country

Japan

Scope

Yokogawa Group companies’ products and Yokogawa Group subsidiaries’ products.
Reported CVEsVendorsProductsReports
24Vulnerabilities found

CVE-2025-48020
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6||MEDIUM
EPSS-Not Assigned
Published-13 Feb, 2026 | 04:54
Updated-13 Feb, 2026 | 04:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-Vnet/IP Interface Package
CWE ID-CWE-617
Reachable Assertion
CVE-2025-48019
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6||MEDIUM
EPSS-Not Assigned
Published-13 Feb, 2026 | 04:51
Updated-13 Feb, 2026 | 04:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-Vnet/IP Interface Package
CWE ID-CWE-617
Reachable Assertion
CVE-2025-1924
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6||MEDIUM
EPSS-Not Assigned
Published-13 Feb, 2026 | 04:46
Updated-13 Feb, 2026 | 04:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-Vnet/IP Interface Package
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-66594
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 12.65%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:37
Updated-09 Feb, 2026 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-66595
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 4.35%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:36
Updated-09 Feb, 2026 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product is vulnerable to Cross-Site Request Forgery (CSRF). When a user accesses a link crafted by an attacker, the user’s account could be compromised. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-66596
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 12.22%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:35
Updated-09 Feb, 2026 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate request headers. When an attacker inserts an invalid host header, users could be redirected to malicious sites. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-66597
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-8.8||HIGH
EPSS-0.03% / 7.89%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:31
Updated-09 Feb, 2026 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports weak cryptographic algorithms, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2025-66598
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.80%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:26
Updated-09 Feb, 2026 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2025-66599
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 12.65%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:25
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-66600
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-8.8||HIGH
EPSS-0.04% / 13.26%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:24
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product lacks HSTS (HTTP Strict Transport Security) configuration. When an attacker performs a Man in the middle (MITM) attack, communications with the web server could be sniffed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CVE-2025-66601
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6.3||MEDIUM
EPSS-0.04% / 13.26%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:17
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not specify MIME types. When an attacker performs a content sniffing attack, malicious scripts could be executed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CVE-2025-66602
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 12.22%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:16
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts access by IP address. When a worm that randomly searches for IP addresses intrudes into the network, it could potentially be attacked by the worm. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-291
Reliance on IP Address for Authentication
CVE-2025-66603
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-2.1||LOW
EPSS-0.04% / 13.26%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:15
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts the OPTIONS method. An attacker could potentially use this information to carry out other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CVE-2025-66604
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-2.1||LOW
EPSS-0.03% / 7.89%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:14
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version could be displayed on the web page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-66605
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-2.1||LOW
EPSS-0.04% / 12.65%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:13
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input fields on this webpage with the autocomplete attribute enabled, the input content could be saved in the browser the user is using. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-66608
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-8.7||HIGH
EPSS-0.06% / 18.87%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:11
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. An attacker could send specially crafted requests to steal files from the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-29
Path Traversal: '\..\filename'
CVE-2025-66607
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-6.3||MEDIUM
EPSS-0.04% / 13.26%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:09
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. Users could be redirected to malicious sites by an attacker. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-358
Improperly Implemented Security Check for Standard
CVE-2025-66606
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-2.1||LOW
EPSS-0.05% / 14.43%
||
7 Day CHG~0.00%
Published-09 Feb, 2026 | 03:06
Updated-09 Feb, 2026 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious scripts. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-FAST/TOOLS
CWE ID-CWE-86
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
CVE-2025-1863
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 49.69%
||
7 Day CHG+0.18%
Published-18 Apr, 2025 | 05:55
Updated-21 Apr, 2025 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure default settings for recorder products

Insecure default settings have been found in recorder products provided by Yokogawa Electric Corporation. The default setting of the authentication function is disabled on the affected products. Therefore, when connected to a network with default settings, anyone can access all functions related to settings and operations. As a result, an attacker can illegally manipulate and configure important data such as measured values and settings. This issue affects GX10 / GX20 / GP10 / GP20 Paperless Recorders: R5.04.01 or earlier; GM Data Acquisition System: R5.05.01 or earlier; DX1000 / DX2000 / DX1000N Paperless Recorders: R4.21 or earlier; FX1000 Paperless Recorders: R1.31 or earlier; μR10000 / μR20000 Chart Recorders: R1.51 or earlier; MW100 Data Acquisition Units: All versions; DX1000T / DX2000T Paperless Recorders: All versions; CX1000 / CX2000 Paperless Recorders: All versions.

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-GX10 / GX20 / GP10 / GP20 Paperless RecordersμR10000 / μR20000 Chart RecordersGM Data Acquisition SystemMW100 Data Acquisition UnitsDX1000 / DX2000 / DX1000N Paperless RecordersCX1000 / CX2000 Paperless RecordersDX1000T / DX2000T Paperless RecordersFX1000 Paperless Recorders
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2024-8110
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.04%
||
7 Day CHG~0.00%
Published-17 Sep, 2024 | 02:04
Updated-20 Sep, 2024 | 12:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Denial of Service (DoS) vulnerability has been found in Dual-redundant Platform for Computer. If a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart. If both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable.

Action-Not Available
Vendor-Yokogawa Electric Corporationyokogawa
Product-Dual-redundant Platform for Computer (PC2CKM)dual-redundant_platform_for_computer_\(pc2ckm\)
CWE ID-CWE-252
Unchecked Return Value
CVE-2024-4106
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.67%
||
7 Day CHG~0.00%
Published-26 Jun, 2024 | 05:30
Updated-01 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS and CI Server. The affected products have built-in accounts with no passwords set. Therefore, if the product is operated without a password set by default, an attacker can break into the affected product. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04 CI Server R1.01.00 to R1.03.00

Action-Not Available
Vendor-Yokogawa Electric Corporationyokogawa_electric_corporation
Product-CI ServerFAST/TOOLSci_serverfast_tools
CWE ID-CWE-258
Empty Password in Configuration File
CVE-2024-4105
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-5.8||MEDIUM
EPSS-0.17% / 38.55%
||
7 Day CHG~0.00%
Published-26 Jun, 2024 | 05:25
Updated-01 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been found in FAST/TOOLS and CI Server. The affected product's WEB HMI server's function to process HTTP requests has a security flaw (Reflected XSS) that allows the execution of malicious scripts. Therefore, if a client PC with inadequate security measures accesses a product URL containing a malicious request, the malicious script may be executed on the client PC. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04 CI Server R1.01.00 to R1.03.00

Action-Not Available
Vendor-Yokogawa Electric Corporation
Product-CI ServerFAST/TOOLS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-5650
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-8.5||HIGH
EPSS-0.17% / 38.77%
||
7 Day CHG~0.00%
Published-17 Jun, 2024 | 06:21
Updated-01 Aug, 2024 | 21:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account. The affected products and versions are as follows: CENTUM CS 3000 R3.08.10 to R3.09.50 CENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.

Action-Not Available
Vendor-Yokogawa Electric Corporationyokogawa
Product-CENTUM CS 3000CENTUM VPcentum_cs_3000centum_vp
CWE ID-CWE-284
Improper Access Control
CVE-2023-5915
Assigner-Yokogawa Group
ShareView Details
Assigner-Yokogawa Group
CVSS Score-5.3||MEDIUM
EPSS-0.43% / 61.68%
||
7 Day CHG~0.00%
Published-01 Dec, 2023 | 06:12
Updated-02 Aug, 2024 | 08:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.

Action-Not Available
Vendor-yokogawaYokogawa Electric Corporation
Product-stardom_fcn_firmwarestardom_fcj_firmwarestardom_fcjstardom_fcnSTARDOM
CWE ID-CWE-400
Uncontrolled Resource Consumption