Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5626

EPSS 1.35% · P80
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-5626

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Yokogawa产品缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Yokogawa CENTUM CS 3000等都是日本横河电机(Yokogawa)公司的产品。Yokogawa CENTUM CS 3000是一套大型生产控制系统。Exaopc是一款OPC数据访问服务器。Exaquantum是一套用于过程工业的工厂信息管理系统(PIMS)。 多款Yokogawa产品中存在缓冲区错误漏洞。远程攻击者可通过特制的数据包利用该漏洞导致拒绝服务(网络通信中断)。以下产品及版本受到影响:Yokogawa CENTUM CS 1000 R3.08.70及之前版本;CENTUM CS
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
YokogawaCENTUM CS 1000 R3.08.70 and earlier -
YokogawaCENTUM CS 3000 R3.09.50 and earlier -
YokogawaCENTUM CS 3000 Entry R3.09.50 and earlier -
YokogawaCENTUM VP R5.04.20 and earlier -
YokogawaCENTUM VP Entry R5.04.20 and earlier -
YokogawaProSafe-RS R3.02.10 and earlier -
YokogawaExaopc R3.72.00 and earlier -
YokogawaExaquantum R2.85.00 and earlier -
YokogawaExaquantum/Batch R2.50.30 and earlier -
YokogawaExapilot R3.96.10 and earlier -
YokogawaExaplog R3.40.00 and earlier -
YokogawaExasmoc R4.03.20 and earlier -
YokogawaExarqe R4.03.20 and earlier -
YokogawaField Wireless Device OPC Server R2.01.02 and earlier -
YokogawaPRM R3.12.00 and earlier -
YokogawaSTARDOM VDS R7.30.01 and earlier -
YokogawaSTARDOM OPC Server for Windows R3.40 and earlier -
YokogawaFAST/TOOLS R10.01 and earlier -
YokogawaB/M9000CS R5.05.01 and earlier -
YokogawaB/M9000 VP R7.03.04 and earlier -
YokogawaFieldMate R1.01 -

II. Public POCs for CVE-2015-5626

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-5626

Please Login to view more intelligence information

Same Patch Batch · Yokogawa · 2020-02-05 · 3 CVEs total

CVE-2015-5627多款Yokogawa产品缓冲区错误漏洞
CVE-2015-5628多款Yokogawa产品缓冲区错误漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2015-5626

No comments yet


Leave a comment