First published: Fri Oct 12 2018(Updated: )
Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The controller application fails to prevent memory exhaustion by unauthorized requests. This could allow an attacker to cause the controller to become unstable.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Fcj Firmware | <=r4.10 | |
Yokogawa Fcj | ||
Yokogawa Fcn-100 Firmware | <=r4.10 | |
Yokogawa Fcn-100 | ||
Yokogawa Fcn-rtu Firmware | <=r4.10 | |
Yokogawa Fcn-rtu | ||
Yokogawa Fcn-500 Firmware | <=r4.10 | |
Yokogawa Fcn-500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17898 is a vulnerability in Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, and FCN-500 versions R4.10 and prior, which allows unauthorized requests to cause memory exhaustion and make the controller unstable.
CVE-2018-17898 has a severity rating of 7.5 (high).
The attacker can exploit CVE-2018-17898 by sending unauthorized requests to the controller application, causing memory exhaustion and making the controller unstable.
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, and FCN-500 versions R4.10 and prior are affected by CVE-2018-17898.
To mitigate the CVE-2018-17898 vulnerability, it is recommended to upgrade to a version higher than R4.10 or apply the necessary patches provided by Yokogawa.