Vulnerability Description
In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.
CVSS Score
2.8
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yokogawa | Widefield3 | >= 1.01, <= 4.03 |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02MitigationThird Party AdvisoryUS Government Resource
- https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisoVendor Advisory
- https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02MitigationThird Party AdvisoryUS Government Resource
- https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisoVendor Advisory
FAQ
What is CVE-2020-16232?
CVE-2020-16232 is a vulnerability with a CVSS score of 2.8 (LOW). In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.
How severe is CVE-2020-16232?
CVE-2020-16232 has been rated LOW with a CVSS base score of 2.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-16232?
Check the references section above for vendor advisories and patch information. Affected products include: Yokogawa Widefield3.