Project Subscriptions
| Vendors | Products |
|---|---|
|
Yokogawa
Subscribe
|
B\/m9000 Vp
Subscribe
B\/m9000 Vp Software
Subscribe
B\/m9000cs
Subscribe
B\/m9000cs Software
Subscribe
Centum Cs 1000
Subscribe
Centum Cs 1000 Software
Subscribe
Centum Cs 3000
Subscribe
Centum Cs 3000 Entry Class
Subscribe
Centum Cs 3000 Entry Class Software
Subscribe
Centum Cs 3000 Software
Subscribe
Centum Vp
Subscribe
Centum Vp Entry Class
Subscribe
Centum Vp Entry Class Software
Subscribe
Centum Vp Software
Subscribe
Exaopc
Subscribe
|
No advisories yet.
Solution
Yokogawa has created a patch (CENTUM CS 3000 R3.09.73 and R3.09.75) to mitigate the reported vulnerabilities. To activate the patch software, the computer needs to be rebooted. Older versions of the CENTUM CS 3000 will need to be updated to the latest version of R3.09.50 before installing the patch software. Yokogawa also suggests all customers introduce appropriate security measures to the overall system, not just for the vulnerabilities identified. For more information, please see the advisory that Yokogawa has published regarding this issue here: http://www.yokogawa.com/dcs/security/ysar/dcs-ysar-index-en.htm .
Workaround
No workaround given by the vendor.
Thu, 25 Sep 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Yokogawa CENTUM CS 3000 Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-25T17:27:46.585Z
Reserved: 2014-01-02T00:00:00.000Z
Link: CVE-2014-0782
No data.
Status : Deferred
Published: 2014-05-16T11:12:00.243
Modified: 2025-09-25T18:15:35.300
Link: CVE-2014-0782
No data.
OpenCVE Enrichment
No data.