A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition.
The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
References
Link | Resource |
---|---|
https://jvn.jp/vu/JVNVU95177889/index.html | Mitigation Third Party Advisory |
https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf | Mitigation Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02 | Mitigation Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: YokogawaGroup
Published: 2023-12-01T06:12:03.581Z
Updated: 2023-12-01T06:14:45.335Z
Reserved: 2023-11-02T04:37:11.569Z
Link: CVE-2023-5915
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-12-01T07:15:12.627
Modified: 2023-12-08T18:24:27.517
Link: CVE-2023-5915
JSON object: View
Redhat Information
No data.