Show plain JSON{"containers": {"cna": {"affected": [{"product": "WideField3", "vendor": "Yokogawa", "versions": [{"lessThanOrEqual": "R4.03", "status": "affected", "version": "R1.01", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Parity Dynamics reported this vulnerability to CISA."}], "descriptions": [{"lang": "en", "value": "In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-03-18T18:00:29", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"}], "solutions": [{"lang": "en", "value": "Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision.\n\nFor more information about this vulnerability and the associated mitigations, please see Yokogawa\u2019s security advisory report YSAR-20-0002"}], "source": {"discovery": "EXTERNAL"}, "title": "Yokogawa WideField3 Buffer Copy Without Checking Size of Input", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-16232", "STATE": "PUBLIC", "TITLE": "Yokogawa WideField3 Buffer Copy Without Checking Size of Input"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "WideField3", "version": {"version_data": [{"version_affected": "<=", "version_name": "R1.01", "version_value": "R4.03"}]}}]}, "vendor_name": "Yokogawa"}]}}, "credit": [{"lang": "eng", "value": "Parity Dynamics reported this vulnerability to CISA."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-120 Buffer Overflow"}]}]}, "references": {"reference_data": [{"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02"}, {"name": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/", "refsource": "CONFIRM", "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"}]}, "solution": [{"lang": "en", "value": "Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision.\n\nFor more information about this vulnerability and the associated mitigations, please see Yokogawa\u2019s security advisory report YSAR-20-0002"}], "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T13:37:54.174Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"}]}]}, "cveMetadata": {"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-16232", "datePublished": "2022-03-18T18:00:29", "dateReserved": "2020-07-31T00:00:00", "dateUpdated": "2024-08-04T13:37:54.174Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}