{"containers":{"cna":{"affected":[{"product":"WideField3","vendor":"Yokogawa","versions":[{"lessThanOrEqual":"R4.03","status":"affected","version":"R1.01","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Parity Dynamics reported this vulnerability to CISA."}],"descriptions":[{"lang":"en","value":"In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":2.8,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-120","description":"CWE-120 Buffer Overflow","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-18T18:00:29.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"}],"solutions":[{"lang":"en","value":"Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision.\n\nFor more information about this vulnerability and the associated mitigations, please see Yokogawa’s security advisory report YSAR-20-0002"}],"source":{"discovery":"EXTERNAL"},"title":"Yokogawa WideField3 Buffer Copy Without Checking Size of Input","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2020-16232","STATE":"PUBLIC","TITLE":"Yokogawa WideField3 Buffer Copy Without Checking Size of Input"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WideField3","version":{"version_data":[{"version_affected":"<=","version_name":"R1.01","version_value":"R4.03"}]}}]},"vendor_name":"Yokogawa"}]}},"credit":[{"lang":"eng","value":"Parity Dynamics reported this vulnerability to CISA."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":2.8,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-120 Buffer Overflow"}]}]},"references":{"reference_data":[{"name":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02","refsource":"CONFIRM","url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02"},{"name":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/","refsource":"CONFIRM","url":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"}]},"solution":[{"lang":"en","value":"Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision.\n\nFor more information about this vulnerability and the associated mitigations, please see Yokogawa’s security advisory report YSAR-20-0002"}],"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T13:37:54.174Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-20-273-02"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-16T15:55:36.631941Z","id":"CVE-2020-16232","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-16T16:41:56.260Z"}}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2020-16232","datePublished":"2022-03-18T18:00:29.000Z","dateReserved":"2020-07-31T00:00:00.000Z","dateUpdated":"2025-04-16T16:41:56.260Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}