Description
In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.
Published: 2022-03-18
Score: 2.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision. For more information about this vulnerability and the associated mitigations, please see Yokogawa’s security advisory report YSAR-20-0002

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-8198 In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Yokogawa Widefield3
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:41:56.260Z

Reserved: 2020-07-31T00:00:00.000Z

Link: CVE-2020-16232

cve-icon Vulnrichment

Updated: 2024-08-04T13:37:54.174Z

cve-icon NVD

Status : Modified

Published: 2022-03-18T18:15:08.997

Modified: 2024-11-21T05:06:59.407

Link: CVE-2020-16232

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses