PROTOCOL-SCADA -- Snort alerted on SCADA protocol activity. SCADA is used in Industrial Control Systems (ICS), programmable logic controllers for large scale systems, such as water treatment facilities. SCADA systems often require no authentication and use generic commands that are hard to screen for. Snort rules look for specific hardware and the traffic protocols they use, as these are often tied to a specific port or URI request.
PROTOCOL-SCADA Yokogawa CENTUM CS 3000 stack buffer overflow attempt
Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet. Impact: CVSS base score 9.0 CVSS impact score 8.5 CVSS exploitability score 10.0 confidentialityImpact PARTIAL integrityImpact PARTIAL availabilityImpact PARTIAL Details: Ease of Attack:
No information provided
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
CVE-2014-0783 |
Loading description
|