First published: Fri Sep 28 2018(Updated: )
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Fcj Firmware | <=r4.10 | |
Yokogawa Fcj | ||
Yokogawa Fcn-100 Firmware | <=r4.10 | |
Yokogawa Fcn-100 | ||
Yokogawa Fcn-rtu Firmware | <=r4.10 | |
Yokogawa Fcn-rtu | ||
Yokogawa Fcn-500 Firmware | <=r4.10 | |
Yokogawa Fcn-500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-17902.
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, all versions up to R4.10 are affected.
The severity of CVE-2018-17902 is medium with a CVSS score of 5.3.
This vulnerability could result in a denial of service to the remote management functions of the affected controllers.
No specific fixes or patches are mentioned in the vulnerability report, but users are advised to follow the recommendations provided by Yokogawa in their advisory.