A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition.
The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU95177889/index.html | Mitigation Third Party Advisory |
https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf | Mitigation Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 | Mitigation Third Party Advisory US Government Resource |
https://jvn.jp/vu/JVNVU95177889/index.html | Mitigation Third Party Advisory |
https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf | Mitigation Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 | Mitigation Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/vu/JVNVU95177889/index.html - Mitigation, Third Party Advisory | |
References | () https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf - Mitigation, Vendor Advisory | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 - Mitigation, Third Party Advisory, US Government Resource |
08 Dec 2023, 18:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf - Mitigation, Vendor Advisory | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 - Mitigation, Third Party Advisory, US Government Resource | |
References | () https://jvn.jp/vu/JVNVU95177889/index.html - Mitigation, Third Party Advisory | |
CPE | cpe:2.3:o:yokogawa:stardom_fcn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:yokogawa:stardom_fcj_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:stardom_fcj:-:*:*:*:*:*:*:* cpe:2.3:h:yokogawa:stardom_fcn:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | NVD-CWE-noinfo |
01 Dec 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-01 07:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5915
Mitre link : CVE-2023-5915
CVE.ORG link : CVE-2023-5915
JSON object : View
Products Affected
yokogawa
- stardom_fcn_firmware
- stardom_fcn
- stardom_fcj
- stardom_fcj_firmware
CWE