First published: Mon Jul 04 2022(Updated: )
Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YOKOGAWA Wide Area Communication Router (WAC Router) AW810D, which may allow a remote attacker to cause denial-of-service (DoS) condition by sending a specially crafted packet.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yokogawa Aw810d Firmware | <=r12 | |
Yokogawa Aw810d | ||
Yokogawa Wide Area Communication Router (for AW810D) VI461: Vnet/IP firmware (F) R12 or earlier |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-32284.
The severity of CVE-2022-32284 is high with a CVSS score of 7.5.
The affected software for CVE-2022-32284 is the YOKOGAWA Wide Area Communication Router (WAC Router) AW810D with firmware up to and including r12.
A remote attacker can exploit this vulnerability by sending a specially crafted packet, which may cause a denial-of-service (DoS) condition.
Yes, you can find references for CVE-2022-32284 at the following links: [Reference 1](https://jvn.jp/vu/JVNVU95343906/index.html), [Reference 2 (PDF)](https://web-material3.yokogawa.com/1/32825/files/YSAR-22-0005-E.pdf), [Reference 3 (PDF)](https://web-material3.yokogawa.com/19/32825/files/YSAR-22-0005-J.pdf).