OTPulse

Yokogawa Dual-redundant Platform for Computer (PC2CKM)

Plan Patch7.5ICS-CERT ICSA-24-261-03Sep 17, 2024
Summary

A denial-of-service vulnerability exists in Yokogawa Dual-redundant Platform for Computer (PC2CKM) versions R1.01.00 through R2.03.00 (prior to R2.03.10). An attacker with network access can send a crafted request that causes the platform to become unresponsive, disrupting control system operations. CWE-252 (Unchecked Return Value) is the root cause. Exploitation requires only network connectivity and no authentication.

What this means
What could happen
An attacker could cause the PC2CKM redundant platform to become unavailable, interrupting safety-critical or process-critical operations that depend on this dual-redundant control system.
Who's at risk
Energy and manufacturing organizations using Yokogawa PC2CKM dual-redundant platforms for critical control system operations should prioritize this issue. The platform is commonly used in power generation, water treatment, and continuous process manufacturing where availability is essential to safe operations.
How it could be exploited
An attacker with network access to the PC2CKM platform sends a specially crafted request that triggers a denial-of-service condition, making the device unresponsive. The specific technical mechanism is not disclosed, but successful exploitation crashes or freezes the redundant platform.
Prerequisites
  • Network access to the PC2CKM platform
  • No authentication required (based on CVSS 7.5 and no authentication mentioned in advisory)
Remotely exploitableNo authentication requiredAffects safety and availability-critical systemsDenial-of-service impact on redundant control platforms
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (1)
ProductAffected VersionsFix Status
Dual-redundant Platform for Computer (PC2CKM): >=R1.01.00|<R2.03.00≥ R1.01.00|<R2.03.00R2.03.10
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDRestrict network access to PC2CKM—ensure the platform is not reachable from the internet or untrusted networks
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Yokogawa PC2CKM to version R2.03.10 or later
Long-term hardening
0/2
HARDENINGPlace PC2CKM behind a firewall and isolate it from business networks; use network segmentation to limit exposure
HARDENINGIf remote access to PC2CKM is required, implement VPN with current security updates and restrict access to authorized personnel only
↑↓ Navigate · Esc Close
API: /api/v1/advisories/b8cdcf99-734c-4cbe-841f-da17a1ad4359