Lucene search

K
cve[email protected]CVE-2018-16196
HistoryJan 09, 2019 - 11:29 p.m.

CVE-2018-16196

2019-01-0923:29:04
CWE-20
web.nvd.nist.gov
32
cve
yokogawa
vnet/ip
open communication driver
denial of service
nvd
vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.3%

Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver’s communication via unspecified vectors.

Affected configurations

NVD
Node
yokogawacentum_cs_3000Match-
AND
yokogawacentum_cs_3000_firmwareRanger3.05.00r3.09.50
Node
yokogawacentum_cs_3000_entry_classRanger3.05.00r3.09.50
Node
yokogawacentum_vpMatch-
AND
yokogawacentum_vp_firmwareRanger4.01.00r6.03.10
Node
yokogawacentum_vp_entry_classRanger4.01.00r6.03.10
Node
yokogawab\/m9000_vpRanger6.03.01r8.01.90
OR
yokogawaexaopcRanger3.10.00r3.75.00
OR
yokogawafast\/toolsRanger9.02.00r10.02.00
OR
yokogawaplant_resource_managerRanger2.06.00r3.31.00
OR
yokogawaprosafe-rsRanger1.02.00r4.02.00

CNA Affected

[
  {
    "product": "Multiple Yokogawa products that contain Vnet/IP Open Communication Driver",
    "vendor": "Yokogawa Electric Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "(CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90))"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.3%

Related for CVE-2018-16196