First published: Fri Mar 18 2022(Updated: )
In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa WideField3 | >=1.01<=4.03 | |
Yokogawa WideField3 R1.01 - R4.03 |
Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision. For more information about this vulnerability and the associated mitigations, please see Yokogawa’s security advisory report YSAR-20-0002
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16232 is a vulnerability in Yokogawa WideField3 R1.01 - R4.03 that can cause a buffer overflow when a user loads a maliciously crafted project file.
The severity of CVE-2020-16232 is critical with a CVSS score of 9.8.
A buffer overflow can be caused in Yokogawa WideField3 R1.01 - R4.03 when a user loads a maliciously crafted project file.
CVE-2020-16232 affects Yokogawa WideField3 versions from R1.01 to R4.03 (inclusive).
Yes, you can refer to the resources provided by CISA and Yokogawa for more information about CVE-2020-16232.