Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Severe Flaws Found in Yokogawa Switches, Control Systems

Japanese electrical engineering company Yokogawa published two security advisories last week to inform customers that some of its products are affected by serious vulnerabilities.

Japanese electrical engineering company Yokogawa published two security advisories last week to inform customers that some of its products are affected by serious vulnerabilities.

One of the flaws, for which ICS-CERT also published an advisory, is CVE-2018-0651, a high severity stack-based buffer overflow affecting the license management function present in some products.

Sending specially crafted data to the licensing function could cause it to stop, but users have been warned that an unprivileged attacker with network access to the targeted system may also be able to exploit the flaw for arbitrary code execution.

According to Yokogawa and ICS-CERT, the security hole impacts the ASTPLANNER production scheduling software, the TriFellows package for the CENTUM CS control system, STARDOM control systems, and the iDefine functional safety management tool for the ProSafe-RS process safety system.

Yokogawa has already released a patch for STARDOM controllers and it plans on issuing a fix for iDefine. ASTPLANNER and TriFellows customers have been advised to contact the company’s support team.

Register for SecurityWeek’s 2018 ICS Cyber Security Conference

The second vulnerability, which impacts more than a dozen of Yokogawa’s Vnet/IP industrial switches, has also been classified as “high severity,” but no CVE identifier has been assigned.

The flaw affects the debugging functionality of these devices. The problem is related to the tcpdump command, which is used for monitoring and analyzing network traffic. The tcpdump command is disabled by default, but if users have enabled it, an unprivileged network attacker could use it to disrupt the connection or make changes to the switch’s configuration.

Advertisement. Scroll to continue reading.

A few months ago, Yokogawa informed users that it released a firmware update for its STARDOM controllers to address a critical hardcoded credentials vulnerability that can be exploited remotely to take control of a device.

Related: Yokogawa Patches Serious Flaws in ICS Products

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.