First published: Fri Dec 01 2023(Updated: )
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
Credit: 7168b535-132a-4efe-a076-338f829b2eb9
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Yokogawa Stardom Fcj Firmware | >=r1.01<=r4.31 | |
Yokogawa Stardom Fcj | ||
All of | ||
Yokogawa Stardom Fcn Firmware | >=r1.01<=r4.31 | |
Yokogawa Stardom Fcn |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5915 is medium, with a severity value of 5.3.
A remote attacker can exploit CVE-2023-5915 by sending a crafted packet to the FCN/FCJ controller.
The affected software of CVE-2023-5915 is STARDOM provided by Yokogawa Electric Corporation, specifically the FCN/FCJ firmware versions r1.01 to r4.31.
To fix CVE-2023-5915, it is recommended to update the STARDOM FCN/FCJ firmware to a version higher than r4.31.
You can find more information about CVE-2023-5915 in the references provided: https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf, https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-02, https://jvn.jp/vu/JVNVU95177889/index.html.