Yokogawa Centum CS 3000 BKBCopyD Remote Buffer Overflow Exploit

This module exploits a stack based buffer overflow in Yokogawa CENTUM CS 3000 by using its BKBCopyD.exe service.



The Yokogawa Centum CS3000 solution uses different services in order to provide all its functionality. The BKBCopyD.exe service, started when running the FCS / Test Function, listens by default on TCP/20111. By sending a specially crafted packet to the port TCP/20111 it is possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the CENTUM user.
Exploit Type - Old
Exploits/Remote
Exploit Platform
Exploit Type
Product Name