{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:36:05.591","vulnerabilities":[{"cve":{"id":"CVE-2018-16196","sourceIdentifier":"vultures@jpcert.or.jp","published":"2019-01-09T23:29:04.560","lastModified":"2024-11-21T03:52:16.253","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors."},{"lang":"es","value":"Múltiples productos Yokogawa que contienen el controlador Vnet/IP Open Communication (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00) y B/M9000 VP(R6.03.01 - R8.01.90)) permiten que atacantes remotos provoquen una denegación de servicio (DoS) que podría resultar en la detención de la comunicación del controlador Vnet/IP Open Communication mediante vectores sin especificar."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r3.05.00","versionEndIncluding":"r3.09.50","matchCriteriaId":"A3EBF753-16FD-40D3-8EED-D72C32883883"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*","matchCriteriaId":"BAF123F6-D4A3-49B3-B8BC-14AA63E3A46A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_cs_3000_entry_class:*:*:*:*:*:*:*:*","versionStartIncluding":"r3.05.00","versionEndIncluding":"r3.09.50","matchCriteriaId":"B46C20CD-6CA3-4233-BBFF-66E7987C2150"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"r4.01.00","versionEndIncluding":"r6.03.10","matchCriteriaId":"E1045034-D824-4CC1-9326-EEBA3FB34AAA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*","matchCriteriaId":"161A4767-228C-4681-9D20-81D9380CE48A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:centum_vp_entry_class:*:*:*:*:*:*:*:*","versionStartIncluding":"r4.01.00","versionEndIncluding":"r6.03.10","matchCriteriaId":"7A0FF6A1-E352-4EC5-B34B-2C5276B970C9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:b\\/m9000_vp:*:*:*:*:*:*:*:*","versionStartIncluding":"r6.03.01","versionEndIncluding":"r8.01.90","matchCriteriaId":"F8F81F5B-CDB6-4FF2-80CB-D1CA0ABF2C24"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*","versionStartIncluding":"r3.10.00","versionEndIncluding":"r3.75.00","matchCriteriaId":"EFDEE53D-6CF1-4DAF-95DE-BE832CC2A9A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:fast\\/tools:*:*:*:*:*:*:*:*","versionStartIncluding":"r9.02.00","versionEndIncluding":"r10.02.00","matchCriteriaId":"7B22E279-3BFE-4F58-A639-7761559A1365"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:plant_resource_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"r2.06.00","versionEndIncluding":"r3.31.00","matchCriteriaId":"67C8BD51-4D87-4BDF-AF28-68B327392BEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:yokogawa:prosafe-rs:*:*:*:*:*:*:*:*","versionStartIncluding":"r1.02.00","versionEndIncluding":"r4.02.00","matchCriteriaId":"96B459FD-0656-4E3F-A669-F5D07F60949C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106442","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://jvn.jp/vu/JVNVU93652047/index.html","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf","source":"vultures@jpcert.or.jp","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/106442","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://jvn.jp/vu/JVNVU93652047/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}