CVE-2024-8110

7.5 HIGH

📋 TL;DR

A Denial of Service vulnerability in Yokogawa's Dual-redundant Platform allows attackers to cause system restarts by flooding UDP broadcast packets. This affects industrial control systems using this platform, potentially causing temporary service disruption. Both active and standby computers can be affected simultaneously.

💻 Affected Systems

Products:
  • Yokogawa Dual-redundant Platform for Computer
Versions: All versions prior to the fix
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both active and standby computers in redundant configurations. Requires UDP broadcast capability to the affected systems.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Both active and standby computers restart simultaneously, causing complete temporary loss of functionality for industrial control systems, potentially disrupting critical operations.

🟠

Likely Case

Individual computers restart when flooded with UDP packets, causing temporary service disruption until systems recover automatically.

🟢

If Mitigated

With proper network segmentation and rate limiting, impact is limited to isolated network segments with minimal operational disruption.

🌐 Internet-Facing: LOW - Industrial control systems typically shouldn't be internet-facing, but if exposed, UDP floods could trigger restarts.
🏢 Internal Only: HIGH - Internal attackers or compromised systems could send UDP floods to disrupt critical industrial operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires ability to send UDP broadcast packets to affected systems. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version with fix not specified in advisory

Vendor Advisory: https://web-material3.yokogawa.com/1/36276/files/YSAR-24-0003-E.pdf

Restart Required: Yes

Instructions:

1. Contact Yokogawa for patch details 2. Apply provided patches 3. Restart affected systems 4. Verify fix implementation

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems in separate network segments to limit UDP broadcast exposure

Configure firewall rules to block UDP broadcast traffic to affected systems

Rate Limiting

all

Implement UDP rate limiting on network devices

Configure rate limiting on switches/routers: 'rate-limit input udp-broadcast 1000' (example)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Deploy network monitoring to detect UDP flood attempts

🔍 How to Verify

Check if Vulnerable:

Check if running Yokogawa Dual-redundant Platform and review system logs for unexpected restarts following UDP traffic spikes

Check Version:

Contact Yokogawa support for version checking procedures

Verify Fix Applied:

Contact Yokogawa for verification procedures specific to their patch

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system restarts
  • High UDP packet counts in network logs
  • System crash/reboot events

Network Indicators:

  • Spike in UDP broadcast traffic to affected systems
  • Unusual UDP packet patterns

SIEM Query:

source="network" udp_port=* AND packet_count>1000 AND dest_ip="affected_system_ip" | stats count by src_ip

🔗 References

📤 Share & Export