1. EXECUTIVE SUMMARY
- CVSS v3 7.5
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Yokogawa
- Equipment: Dual-redundant Platform for Computer (PC2CKM)
- Vulnerability: Unchecked Return Value
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to perform a denial-of-service.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Yokogawa PC2CKM, a dual-redundant platform computer, are affected:
- Dual-redundant Platform for Computer (PC2CKM): R1.01.00 to R2.03.00
3.2 Vulnerability Overview
3.2.1 UNCHECKED RETURN VALUE CWE-252
If a computer on which the affected product is installed receives a large number of UDP broadcast packets in a short period, occasionally that computer may restart. If both the active and standby computers are restarted at the same time, the functionality on that computer may be temporarily unavailable.
CVE-2024-8110 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
3.3 BACKGROUND
- CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing, Energy, Food and Agriculture
- COUNTRIES/AREAS DEPLOYED: Worldwide
- COMPANY HEADQUARTERS LOCATION: Japan
3.4 RESEARCHER
Yokogawa reported this vulnerability to JPCERT.
4. MITIGATIONS
Yokogawa recommends users update to the following version:
- Dual-redundant Platform for Computer (PC2CKM): Update to R2.03.10
For more information, This article has been indexed from All CISA Advisories