Yokogawa

Fcn-500 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.28%
  • Veröffentlicht 12.10.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 03:55:09

Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The controller application fails to prevent memory exhaustion by unauthorized requests. This could allow an attacker to cause the controller to become unstable.

  • EPSS 0.26%
  • Veröffentlicht 12.10.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 03:55:10

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote access to controllers.

  • EPSS 0.25%
  • Veröffentlicht 12.10.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 03:55:10

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions.

  • EPSS 0.25%
  • Veröffentlicht 12.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:09

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify ...

  • EPSS 7.98%
  • Veröffentlicht 31.07.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:37

Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized admin...