Description
Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.
Published: 2014-03-14
Score: 8.3 High
EPSS: 2.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Yokogawa has created a patch (CENTUM CS 3000 R3.09.73 and R3.09.75) to mitigate the reported vulnerabilities. To activate the patch software, the computer needs to be rebooted. Older versions of the CENTUM CS 3000 will need to be updated to the latest version of R3.09.50 before installing the patch software. Yokogawa also suggests all customers introduce appropriate security measures to the overall system, not just for the vulnerabilities identified. For more information, please see the advisory that Yokogawa has published regarding this issue here: http://www.yokogawa.com/dcs/security/ysar/dcs-ysar-index-en.htm .

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2014-0815 Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.
History

Thu, 25 Sep 2025 17:45:00 +0000

Type Values Removed Values Added
Title Yokogawa CENTUM CS 3000 Stack-based Buffer Overflow
Weaknesses CWE-121
References

Subscriptions

Yokogawa Centum Cs 3000
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-25T17:25:47.981Z

Reserved: 2014-01-02T00:00:00.000Z

Link: CVE-2014-0784

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-03-14T10:55:05.863

Modified: 2025-09-25T18:15:35.647

Link: CVE-2014-0784

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses