Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Yokogawa PC2CKM Flaw Causes Restarts

September 17, 2024
Reading Time: 2 mins read
in Alerts

CISA has issued an advisory regarding a denial-of-service vulnerability in the Yokogawa Dual-redundant Platform for Computer (PC2CKM). The vulnerability, identified as CVE-2024-8110, arises from an unchecked return value that could cause affected devices to restart unexpectedly when subjected to a large volume of UDP broadcast packets in a short time. If both the active and standby computers in the system restart simultaneously, the device functionality may become temporarily unavailable, posing significant risks to organizations relying on these systems in critical infrastructure sectors like manufacturing, energy, and agriculture.

The flaw affects versions R1.01.00 through R2.03.00 of the PC2CKM platform, which is deployed globally across various industries. Yokogawa, the vendor responsible for the platform, has recommended that users update to version R2.03.10, which addresses the vulnerability. The CVSS score of 7.5 indicates that the risk is substantial, with the potential for remote exploitation and low attack complexity. However, as of now, there have been no reports of public exploitation targeting this specific issue.

To mitigate the risk of exploitation, CISA advises users to minimize network exposure for all control system devices, ensuring that they are not accessible from the internet. Organizations should place control systems and remote devices behind firewalls, isolating them from business networks. If remote access is required, it is recommended to use more secure methods like Virtual Private Networks (VPNs), while recognizing the vulnerabilities that may exist within VPN connections. Additionally, users should perform a proper impact analysis and risk assessment before deploying defensive measures.

CISA has also emphasized the importance of cybersecurity best practices, encouraging organizations to stay updated on the latest guidance available on the ICS webpage and to adopt strategies for proactive defense of industrial control systems. The advisory stresses the need for organizations to report any suspected malicious activity to CISA for tracking and correlation. With no known public exploitation of the vulnerability at this time, CISA continues to urge organizations to follow recommended mitigations and update their systems to the latest version of the affected software.

 

Reference:

  • Yokogawa Dual-redundant Platform for Computer (PC2CKM)

Tags: CISACyber AlertsCyber Alerts 2024Cyber threatsSeptember 2024VulnerabilitiesYokogawa
ADVERTISEMENT

Related Posts

Water Curse Group Hits Developers Via GitHub

Water Curse Group Hits Developers Via GitHub

June 17, 2025
Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

June 17, 2025
Water Curse Group Hits Developers Via GitHub

CISA Warns Of Apple Zero Click Exploit

June 17, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

PyPI Malware Steals AWS, CI/CD, macOS Data

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

Image Hiding in DNS TXT Records

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

June 16, 2025

Latest Alerts

Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

CISA Warns Of Apple Zero Click Exploit

PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

Image Hiding in DNS TXT Records

Subscribe to our newsletter

    Latest Incidents

    Zoomcar Data Breach Hits 8.4 Million Users

    Qilin Gang Leaks Asefa FC Barcelona Data

    Gunra Claims 45TB Hack On Colombia Justice

    Hackers Leak 10K VirtualMacOSX Customer Data

    Canada WestJet Airline Contains Cyberattack

    Washington Post Investigates Cyberattack on Emails

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial