CVE-2018-16196
moderate-risk
Published 2019-01-09
Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors.
Do I need to act?
~
1.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (9)
Centum Cs 3000 Firmware
Centum Cs 3000 Entry Class
Centum Vp Firmware
Centum Vp Entry Class
B\/M9000 Vp
Exaopc
Fast\/Tools
Plant Resource Manager
Prosafe-Rs
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/106442
Third Party Advisory
https://jvn.jp/vu/JVNVU93652047/index.html
Vendor Advisory
https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf
Third Party Advisory
http://www.securityfocus.com/bid/106442
Third Party Advisory
https://jvn.jp/vu/JVNVU93652047/index.html
Vendor Advisory
https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf
45
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
4/34 · Minimal
Exposure
15/34 · Moderate