PRODUCTS / EXHIBITION

Cyber security information of Duplo products

Dec 1st, 2023

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. However, you have already enabled Windows Update, it is not necessary to take any measures because Windows Update always keeps the security in the computer up to date.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please be informed about the detail and the products subject to in the table below.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
PC CONTOROLLER PC Controller for DIB-R https://nvd.nist.gov/vuln/detail/CVE-2023-36788
https://nvd.nist.gov/vuln/detail/CVE-2023-36792
https://nvd.nist.gov/vuln/detail/CVE-2023-36793
https://nvd.nist.gov/vuln/detail/CVE-2023-36794
https://nvd.nist.gov/vuln/detail/CVE-2023-36796
https://nvd.nist.gov/vuln/detail/CVE-2023-36873
https://nvd.nist.gov/vuln/detail/CVE-2023-36899
https://nvd.nist.gov/vuln/detail/CVE-2023-32030
https://nvd.nist.gov/vuln/detail/CVE-2023-29331
https://nvd.nist.gov/vuln/detail/CVE-2023-29326
https://nvd.nist.gov/vuln/detail/CVE-2023-24895
https://nvd.nist.gov/vuln/detail/CVE-2023-24897
https://nvd.nist.gov/vuln/detail/CVE-2023-24936
PC Controller for DMSF-10
PC Controller for DSF-2200
PC Controller for DSF-6000
PC Controller for DSC-10/60i
PC Controller for DDC-810
PC Controller for DDC-8000
PC Controller for DSM-1000
PC Controller for DM-LU2
Duplo GA - PC Controller
Other software External Feed Controller
DM JOB FILE TRANSFER
eTandem
Duplo + insight Connector

〈MEASURE〉
On the computer used for Duplo product, please follow the steps as mentioned below to make sure the update.
Select [Start menu] > [Settings] > [Update & Security] > [Windows Update].
Or, select [Start menu] > [Settings] > [Windows Update].
After that, if the screen indicates “Your device is up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Product information sheet File No. P3674".

Duplo Corporation

May 18th, 2023

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. However, you have already enabled Windows Update, it is not necessary to take any measures because Windows Update always keeps the security in the computer up to date.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please be informed about the detail and the products subject to in the table below.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
PC CONTOROLLER PC Controller for DIB-R https://nvd.nist.gov/vuln/detail/CVE-2023-21722
https://nvd.nist.gov/vuln/detail/CVE-2022-41089
https://nvd.nist.gov/vuln/detail/CVE-2022-41064
https://nvd.nist.gov/vuln/detail/CVE-2022-26929
PC Controller for DMSF-10
PC Controller for DSF-2200
PC Controller for DSF-6000
PC Controller for DSC-10/60i
PC Controller for DDC-810
PC Controller for DDC-8000
PC Controller for DSM-1000
PC Controller for DM-LU2
Duplo GA - PC Controller
Other software External Feed Controller
DM JOB FILE TRANSFER
eTandem
Duplo + insight Connector

〈MEASURE〉
On the computer used for Duplo product, please follow the steps as mentioned below to make sure the update.
Select [Start menu] > [Settings] > [Update & Security] > [Windows Update].
Or, select [Start menu] > [Settings] > [Windows Update].
After that, if the screen indicates “Your device is up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Product information sheet File No. P3674".

Duplo Corporation

February 10th 2023

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. The products model DDC-810, DDC-8000 and DSM-1000 are subject to this issue.

We already have taken the measures for those products to prevent the issue. Model DDC-810 and DDC-8000 have been applied the measures and scheduled to ship from next production.
Model DSM-1000 has been applied the measures since the first production.

For such products, those shipped out or under production already, our software team has decided it is not necessary to take any measures because of their assessment of the vulnerabilities.
If you have any questions or concerns, for example, a vulnerabilities of the product you ordered, please do not hesitate to contact our service personnel. We would appreciate it if you could see the table below and contact us with the model name you using and the product information sheet File No mentioned in the next column.

Please be informed about the detail and the products subject to in the table below.

Product Model name Product information sheet File No. Program No. Reference for detail
PC CONTROLLER DSM-1000 P3683 19A-86814 or less See (Table 1) DSM-1000.
DDC-8000 P3669 19F-86925 or less See (Table 2) DDC-8000.
DDC-810 P3669 16K-86534 or less See (Table 3) DDC-810.

(Table 1) DSM-1000

Description Reference for detail
Vulnerabilities of Ghostscript https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817

(Table 2) DDC-8000

Description Reference for detail
Vulnerabilities of Ghostscript https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
Vulnerabilities of OpenCV https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14493

(Table 3) DDC-810

Description Reference for detail
Vulnerabilities of Ghostscript https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
Vulnerabilities of OpenCV https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12863 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12862 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12599 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12598 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12602 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12601 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12600 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1517 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1516

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could see the table above and contact us with the model name you using and the product information sheet File No mentioned in the next column.

Duplo Corporation

December 14th 2022

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. However, you have already enabled Windows Update, it is not necessary to take any measures because Windows Update always keeps the security in the computer up to date.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please be informed about the detail and the products subject to in the table below.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
PC CONTOROLLER PC Controller for DIB-R https://nvd.nist.gov/vuln/detail/CVE-2022-30130
https://www.cve.org/CVERecord?id=CVE-2022-26832
https://www.cve.org/CVERecord?id=CVE-2022-21911
PC Controller for DMSF-10
PC Controller for DSF-2200
PC Controller for DSF-6000
PC Controller for DSC-10/60i
PC Controller for DDC-810
PC Controller for DDC-8000
PC Controller for DSM-1000
PC Controller for DM-LU2
Duplo GA - PC Controller
Other software External Feed Controller
DM JOB FILE TRANSFER
eTandem
Duplo + insight Connector

〈MEASURE〉
On the computer used for Duplo product, please follow the steps as mentioned below to make sure the update.
Select [Start menu] > [Settings] > [Update & Security] > [Windows Update].
Or, select [Start menu] > [Settings] > [Windows Update].
After that, if the screen indicates “Your device is up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Product information sheet File No. P3674".

Duplo Corporation