Yokogawa Centum CS 3000 BKBCopyD Remote Buffer Overflow Exploit

This module exploits a stack based buffer overflow in Yokogawa CENTUM CS 3000 by using its BKBCopyD.exe service. The Yokogawa Centum CS3000 solution uses different services in order to provide all its functionality. The BKBCopyD.exe service, started when running the FCS / Test Function, listens by default on TCP/20111. By sending a specially crafted packet to the port TCP/20111 it is possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the CENTUM user.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Thursday, May 29, 2014 - 00:00