{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T19:50:59.290","vulnerabilities":[{"cve":{"id":"CVE-2014-0783","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2014-03-14T10:55:05.850","lastModified":"2025-09-25T18:15:35.480","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet."},{"lang":"es","value":"Desbordamiento de buffer basado en pila en BKHOdeq.exe en Yokogawa CENTUM CS 3000 R3.09.50 y anteriores permite a atacantes remotos ejecutar código arbitrario a través de un paquete TCP manipulado."}],"metrics":{"cvssMetricV2":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":8.5,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":8.5,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:*:*:*:*:*:*:*:*","versionEndIncluding":"r3.09.50","matchCriteriaId":"5CECD111-9739-48AA-8ABD-D32757AA93CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.01:*:*:*:*:*:*:*","matchCriteriaId":"40831829-1F44-439C-9A19-7DAAFD36E32F"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.02:*:*:*:*:*:*:*","matchCriteriaId":"C4F916DD-24BC-4955-9C30-A52C2A41B69C"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.03:*:*:*:*:*:*:*","matchCriteriaId":"D660F6DA-8694-4F23-B967-299953DFD293"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.04:*:*:*:*:*:*:*","matchCriteriaId":"D1A408C8-A7CF-439D-85E5-0DD8056A5908"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.05:*:*:*:*:*:*:*","matchCriteriaId":"CA37B07D-505E-414A-9E69-E2AAB239CA35"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.06:*:*:*:*:*:*:*","matchCriteriaId":"32BBCAC6-AB8D-4D68-A5E4-F7FBFC3F4B33"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.07:*:*:*:*:*:*:*","matchCriteriaId":"BB1B75CD-C0BA-4046-A49E-9903B3B5972C"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.08:*:*:*:*:*:*:*","matchCriteriaId":"E07B64DB-E820-467B-A603-971970637FB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.50:*:*:*:*:*:*:*","matchCriteriaId":"6813F466-42F8-4013-97A4-DA6E5D7C52F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.08.70:*:*:*:*:*:*:*","matchCriteriaId":"7B0FEB1C-1427-4875-82C6-7EBD2B262766"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000:r3.09:*:*:*:*:*:*:*","matchCriteriaId":"1824EC58-BCB1-4876-8729-2B6FF2FF8D1D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/66130","source":"ics-cert@hq.dhs.gov"},{"url":"http://www.yokogawa.com/dcs/security/ysar/dcs-ysar-index-en.htm.","source":"ics-cert@hq.dhs.gov"},{"url":"https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities","source":"ics-cert@hq.dhs.gov","tags":["Exploit"]},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-070-01a","source":"ics-cert@hq.dhs.gov"},{"url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-070-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/66111","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://community.rapid7.com/community/metasploit/blog/2014/03/10/yokogawa-centum-cs3000-vulnerabilities","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}