CENTUM VP / CS 3000 controller FCS (CP31, CP33, CP345, CP401, and CP451) contains an issue in processing communication packets, which may lead to resource consumption. If this vulnerability is exploited, an attacker may cause a denial of service (DoS) condition in ADL communication by sending a specially crafted packet to the affected product.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU94343729/index.html | Third Party Advisory |
https://web-material3.yokogawa.com/1/33029/files/YSAR-22-0008-E.pdf | Vendor Advisory |
https://web-material3.yokogawa.com/19/33029/files/YSAR-22-0008-J.pdf | Vendor Advisory |
https://jvn.jp/vu/JVNVU94343729/index.html | Third Party Advisory |
https://web-material3.yokogawa.com/1/33029/files/YSAR-22-0008-E.pdf | Vendor Advisory |
https://web-material3.yokogawa.com/19/33029/files/YSAR-22-0008-J.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 07:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/vu/JVNVU94343729/index.html - Third Party Advisory | |
References | () https://web-material3.yokogawa.com/1/33029/files/YSAR-22-0008-E.pdf - Vendor Advisory | |
References | () https://web-material3.yokogawa.com/19/33029/files/YSAR-22-0008-J.pdf - Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
17 Aug 2022, 15:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:h:yokogawa:centum_vp_3000_cp451:-:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_cs_3000_cp33_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_vp_3000_cp451_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_cs_3000_cp31_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_cs_3000_cp345:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_vp_3000_cp401:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_cs_3000_cp451:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_cs_3000_cp33:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_cs_3000_cp31:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:centum_cs_3000_cp401:-:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_cs_3000_cp401_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_vp_3000_cp401_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_cs_3000_cp345_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:centum_cs_3000_cp451_firmware:-:*:*:*:*:*:*:* |
|
CWE | CWE-400 | |
References | (MISC) https://jvn.jp/vu/JVNVU94343729/index.html - Third Party Advisory | |
References | (MISC) https://web-material3.yokogawa.com/19/33029/files/YSAR-22-0008-J.pdf - Vendor Advisory | |
References | (MISC) https://web-material3.yokogawa.com/1/33029/files/YSAR-22-0008-E.pdf - Vendor Advisory |
16 Aug 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-16 08:15
Updated : 2024-11-21 07:08
NVD link : CVE-2022-33939
Mitre link : CVE-2022-33939
CVE.ORG link : CVE-2022-33939
JSON object : View
Products Affected
yokogawa
- centum_cs_3000_cp401
- centum_vp_3000_cp401_firmware
- centum_cs_3000_cp345_firmware
- centum_vp_3000_cp401
- centum_vp_3000_cp451_firmware
- centum_cs_3000_cp33
- centum_cs_3000_cp33_firmware
- centum_vp_3000_cp451
- centum_cs_3000_cp401_firmware
- centum_cs_3000_cp31_firmware
- centum_cs_3000_cp451_firmware
- centum_cs_3000_cp451
- centum_cs_3000_cp345
- centum_cs_3000_cp31
CWE