Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2014-0783
Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.064
EPSS Ranking
90.6%
CVSS Severity
CVSS v2 Score
9.0
References
http://ics-cert.us-cert.gov/advisories/ICSA-14-070-01
http://www.securityfocus.com/bid/66111
https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities
http://ics-cert.us-cert.gov/advisories/ICSA-14-070-01
http://www.securityfocus.com/bid/66111
https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities
Products affected by CVE-2014-0783
Yokogawa
»
Centum Cs 3000
»
Version:
r3.01
cpe:2.3:a:yokogawa:centum_cs_3000:r3.01
Yokogawa
»
Centum Cs 3000
»
Version:
r3.02
cpe:2.3:a:yokogawa:centum_cs_3000:r3.02
Yokogawa
»
Centum Cs 3000
»
Version:
r3.03
cpe:2.3:a:yokogawa:centum_cs_3000:r3.03
Yokogawa
»
Centum Cs 3000
»
Version:
r3.04
cpe:2.3:a:yokogawa:centum_cs_3000:r3.04
Yokogawa
»
Centum Cs 3000
»
Version:
r3.05
cpe:2.3:a:yokogawa:centum_cs_3000:r3.05
Yokogawa
»
Centum Cs 3000
»
Version:
r3.06
cpe:2.3:a:yokogawa:centum_cs_3000:r3.06
Yokogawa
»
Centum Cs 3000
»
Version:
r3.07
cpe:2.3:a:yokogawa:centum_cs_3000:r3.07
Yokogawa
»
Centum Cs 3000
»
Version:
r3.08
cpe:2.3:a:yokogawa:centum_cs_3000:r3.08
Yokogawa
»
Centum Cs 3000
»
Version:
r3.08.50
cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50
Yokogawa
»
Centum Cs 3000
»
Version:
r3.08.70
cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70
Yokogawa
»
Centum Cs 3000
»
Version:
r3.09
cpe:2.3:a:yokogawa:centum_cs_3000:r3.09
Yokogawa
»
Centum Cs 3000
»
Version:
r3.09.50
cpe:2.3:a:yokogawa:centum_cs_3000:r3.09.50
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved