{"api_version":"1","generated_at":"2026-05-06T08:13:50+00:00","cve":"CVE-2020-16232","urls":{"html":"https://cve.report/CVE-2020-16232","api":"https://cve.report/api/cve/CVE-2020-16232.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-16232","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-16232"},"summary":{"title":"CVE-2020-16232","description":"In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2022-03-18 18:15:00","updated_at":"2022-03-28 16:26:00"},"problem_types":["CWE-120"],"metrics":[],"references":[{"url":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/","name":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/","refsource":"CONFIRM","tags":[],"title":"Yokogawa Security Advisory Report List | Yokogawa Electric Corporation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02","name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02","refsource":"CONFIRM","tags":[],"title":"Yokogawa WideField3 | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-16232","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-16232","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Parity Dynamics reported this vulnerability to CISA.","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"16232","vulnerable":"1","versionEndIncluding":"4.03","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yokogawa","cpe5":"widefield3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2020-16232","STATE":"PUBLIC","TITLE":"Yokogawa WideField3 Buffer Copy Without Checking Size of Input"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WideField3","version":{"version_data":[{"version_affected":"<=","version_name":"R1.01","version_value":"R4.03"}]}}]},"vendor_name":"Yokogawa"}]}},"credit":[{"lang":"eng","value":"Parity Dynamics reported this vulnerability to CISA."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":2.8,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-120 Buffer Overflow"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02","refsource":"CONFIRM","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02"},{"name":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/","refsource":"CONFIRM","url":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"}]},"solution":[{"lang":"eng","value":"Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision.\n\nFor more information about this vulnerability and the associated mitigations, please see Yokogawa’s security advisory report YSAR-20-0002"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-03-18 18:15:00","lastModifiedDate":"2022-03-28 16:26:00","problem_types":["CWE-120"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yokogawa:widefield3:*:*:*:*:*:*:*:*","versionStartIncluding":"1.01","versionEndIncluding":"4.03","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"16232","Ordinal":"177640","Title":"CVE-2020-16232","CVE":"CVE-2020-16232","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"16232","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}