CVE-2014-0782
Published on: 05/16/2014 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:25:56 PM UTC
Certain versions of B/m9000cs from Yokogawa contain the following vulnerability:
Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.
- CVE-2014-0782 has been assigned by
[email protected] to track the vulnerability
CVSS2 Score: 8.3 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Yokogawa Multiple Products Vulnerabilities | ICS-CERT | US Government Resource ics-cert.us-cert.gov text/html |
![]() |
Sitemap | Yokogawa Electric Corporation | Vendor Advisory www.yokogawa.com application/pdf Inactive LinkNot Archived |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
- cpe:2.3:h:yokogawa:b/m9000cs:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:b/m9000cs_software:*:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:b/m9000_vp:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:b/m9000_vp_software:*:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:b\/m9000cs:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:b\/m9000cs:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:b\/m9000cs_software:*:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:b\/m9000_vp:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:b\/m9000_vp:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:b\/m9000_vp_software:*:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:centum_cs_1000_software:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:centum_cs_1000_software:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:centum_cs_3000_entry_class_software:*:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:centum_cs_3000_software:*:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:*:
- cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:centum_vp_entry_class_software:*:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:centum_vp_software:*:*:*:*:*:*:*:*:
- cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE