Vulnerability Details : CVE-2014-0782
Public exploit exists!
Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2014-0782
Probability of exploitation activity in the next 30 days: 61.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2014-0782
-
Yokogawa CS3000 BKESimmgr.exe Buffer Overflow
Disclosure Date: 2014-03-10First seen: 2020-04-26exploit/windows/scada/yokogawa_bkesimmgr_bofThis module exploits an stack based buffer overflow on Yokogawa CS3000. The vulnerability exists in the BKESimmgr.exe service when handling specially crafted packets, due to an insecure usage of memcpy, using attacker controlled data as the size count. This module ha
CVSS scores for CVE-2014-0782
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
8.3
|
HIGH | AV:N/AC:M/Au:N/C:P/I:P/A:C |
8.6
|
8.5
|
NIST |
CWE ids for CVE-2014-0782
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0782
-
http://ics-cert.us-cert.gov/advisories/ICSA-14-133-01
Yokogawa Multiple Products Vulnerabilities | CISAUS Government Resource
-
http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0001E.pdf
Sitemap | Yokogawa Electric CorporationVendor Advisory
Products affected by CVE-2014-0782
- cpe:2.3:a:yokogawa:b\/m9000cs_software:*:*:*:*:*:*:*:*
- cpe:2.3:h:yokogawa:b\/m9000cs:-:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:centum_cs_1000_software:-:*:*:*:*:*:*:*
- cpe:2.3:h:yokogawa:centum_cs_1000:-:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:centum_cs_3000_software:*:*:*:*:*:*:*:*
- cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:centum_cs_3000_entry_class_software:*:*:*:*:*:*:*:*
- cpe:2.3:h:yokogawa:centum_cs_3000_entry_class:-:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:b\/m9000_vp_software:*:*:*:*:*:*:*:*
- cpe:2.3:h:yokogawa:b\/m9000_vp:-:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:centum_vp_entry_class_software:*:*:*:*:*:*:*:*
- cpe:2.3:h:yokogawa:centum_vp_entry_class:-:*:*:*:*:*:*:*
- cpe:2.3:a:yokogawa:centum_vp_software:*:*:*:*:*:*:*:*
- cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*