CVE-2023-5915
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
Se ha identificado una vulnerabilidad de consumo incontrolado de recursos en STARDOM proporcionado por Yokogawa Electric Corporation. Esta vulnerabilidad puede permitir que un atacante remoto cause una condición de denegación de servicio al controlador FCN/FCJ mediante el envío de un paquete manipulado. Mientras se enviaba el paquete, no se pudo acceder a la página de inicio de mantenimiento del controlador. Por lo tanto, las funciones de la página de inicio de mantenimiento, cambio de configuración, visualización de registros, etc. no están disponibles. Pero la condición no detiene el funcionamiento del controlador. Los productos y versiones afectados son los siguientes: STARDOM FCN/FCJ R1.01 a R4.31.
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-11-02 CVE Reserved
- 2023-12-01 CVE Published
- 2024-08-02 CVE Updated
- 2025-01-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://jvn.jp/vu/JVNVU95177889/index.html | Mitigation | |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 | Mitigation |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf | 2023-12-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Yokogawa Search vendor "Yokogawa" | Stardom Fcj Firmware Search vendor "Yokogawa" for product "Stardom Fcj Firmware" | >= r1.01 <= r4.31 Search vendor "Yokogawa" for product "Stardom Fcj Firmware" and version " >= r1.01 <= r4.31" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Stardom Fcj Search vendor "Yokogawa" for product "Stardom Fcj" | - | - |
Safe
|
Yokogawa Search vendor "Yokogawa" | Stardom Fcn Firmware Search vendor "Yokogawa" for product "Stardom Fcn Firmware" | >= r1.01 <= r4.31 Search vendor "Yokogawa" for product "Stardom Fcn Firmware" and version " >= r1.01 <= r4.31" | - |
Affected
| in | Yokogawa Search vendor "Yokogawa" | Stardom Fcn Search vendor "Yokogawa" for product "Stardom Fcn" | - | - |
Safe
|