Yokogawa Security Advisory Report
All Rights Reserved. Copyright © 2014, Yokogawa Electric Corporation
Yokogawa Security Ad visory Report
YSAR-14-0002E
Published on July 7, 2014
Last updated on December 22, 2017
YSAR-14-0002E: Buffer Overflow Vulnerability in CENTUM systems and Exaopc
Overview:
A computer where CENTUM system or Exaopc is installed has been found with a buffer overflow
vulnerability when Expanded Test Functions are in use. After the investigation, Yokogawa
identified the range of products that could be influenced by the vulnerability and summarized the
countermeasures in this document.
Go over the report and confirm which products are affected in order t o cons ider sec urity mea sures
for the overall systems. Also please consider applying the countermeasures introduced here as
needed.
Affected Products:
Following are t he products that would be affected by the vulnerability reported in this document.
Any computer on which t hese products are inst alled has vulnera bi lit y.
CENTUM CS 1000, CENTUM CS 3000, CENTUM CS 3000 Entry Class,
CENTUM VP, CENTUM VP Entry Class,
Exaopc, B/M9000CS, B/M9000 VP
For details of their revisions, please see <Table 1: List of Products affected by Vulnerabilities and
Countermeasures>.
Vulnerability - Communication Simulation Process in the Expanded Test Functions:
<Affected Packages: Expanded Test F unctions Package>
<Condition of occur rence: When Expanded Test Functions are in use>
On a computer where the affected pack age(s) of the affected prod uct i s installed, if an intentionally crafted
packet is transmitted to the process which simulates c ontrol network communication while the expanded
test functions being executed, a buffer overflow occurs and the ex panded test functions are disabled. There
is a potential risk that successful exploitation of this vulnerabili t y allows remote att acke rs to execute
arbitrary code.
CVSS Base Score: 8.3, Temporal Score: 6.9
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiali ty Impact (C): Partial
Integrity Impact (I): Partial
Availability Impact (A): Complete
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed