Impact of DCOM

Last Updated: April 4, 2023

In the Windows update released on June 14, 2022 (*1), the setting to enable hardening the DCOM server’s authentication level becomes the default setting. With the application of the Windows update, unintended behavior (e.g., inability to communicate etc.) has been observed in products that use DCOM technology. On the other hands, Windows update program released on December 13, 2022 has an additional fix, then this affect is mitigated. Yokogawa is ready to inform customers of whether or not the product operation is affected (*2), and our future policy for resolving the issue, including solutions and workarounds in the event that it is affected.(update)

 

*1 This is one of a series of Windows updates that Microsoft is releasing in response to the DCOM vulnerability in Windows that was disclosed as CVE-2021-26414.


*2 The investigation results for the target products described in this document are the results of an investigation on the impact of applying the Windows update on the DCOM server's authentication level hardening. The investigation results do not guarantee the presence or absence of effects on operations other than DCOM functions. Please refer to the information provided by our Endpoint Security Service (EPS Service) for the impact and applicability of Windows updates on each product.

 

Investigation results of the target products(update)

Behaviors of DCOM function of the following products are not affected if the Windows update program was applied.

     •CENTUM VP (Except for Windows Server 2012 R2) *2
     •ProSafe-RS、ProSafe-RS Lite
     •Exaopc*1
     •Exaquantum (Except for Windows Server 2012 R2) *2
     •Exaquantum/Batch (Except for Windows Server 2012 R2) *2
     •Exaquantum Applications (Except for Windows Server 2012 R2) *2
     •Plant Resource Manager (PRM) *2
     •Insight Suite AE (ISAE)
     •PRM Commissioning Support Package (PRM CSP)*2
     •FieldMate Validator
     •Dual-redundant Platform for Computer
     •Virtualization Platform
     •VTSPortal
     •STARDOM
     •Collaborative Information Server (CI Server)*2
     •OpreX Integrated Recipe Manager (IRM)
     •Mirror Plant
     •FAST/TOOLS (Except for Windows Server 2012 R2)*2
     •Exaplog

*1 When Windows Update is applied to Exaopc, the OPC client products (Exaquantum, etc.) that communicate with Exaopc must also be made hardened for DCOM authentication level, otherwise communication between the products may become impossible.


*2 Windows, the source/destination of communication, may also require the application of Windows update program released on or after December 13, 2022.

It has been confirmed that behaviors of DCOM function of the following products will be affected once the Windows update program (June 14, 2022 or later) was applied to only Windows Server 2012 R2.
For more information on investigation results, solutions and workarounds, please contact Yokogawa Group Local Service / Service office.

     •CENTUM VP (UGS2)
     •Exaquantum
     •Exaquantum/Batch
     •Exaquantum Applications
     •FAST/TOOLS

 

Notes

  • The contents of this website is limited to Yokogawa products. Customers are requested to investigate the impact on products other than Yokogawa products.
  • Windows 7, Windows Server 2008, etc., which are supported by Extended Security Updates (ESU) are not included in the above survey.
  • Any changes in the information of each product will be announced on this website.
  • Every month, Yokogawa checks the behavior of the combination of Yokogawa's control system products with Microsoft product updates and provides the results as an End Point Security service on our members-only Web page. We hope you will take this opportunity to consider signing up for this service.

 

Reference information

The detail information related to this DCOM issue is shown on the below Web site.

További információkat szeretne a munkatársainkról, technológiánkról és megoldásainkról?

Kapcsolatfelvétel

Tetejére