PRODUCTS / EXHIBITION

Cybersecurity information of Duplo products

Apr 26th, 2024(#1)

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. However, you have already enabled Windows Update, it is not necessary to take any measures because Windows Update always keeps the security in the computer up to date.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please be informed about the detail and the products subject to in the table below.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
PC CONTOROLLER PC Controller for DIB-R https://nvd.nist.gov/vuln/detail/CVE-2024-0057
https://nvd.nist.gov/vuln/detail/CVE-2024-21312
https://nvd.nist.gov/vuln/detail/CVE-2023-36560
https://nvd.nist.gov/vuln/detail/CVE-2023-36049
PC Controller for DMSF-10
PC Controller for DSF-2200
PC Controller for DSF-6000
PC Controller for DSC-10/60i
PC Controller for DDC-810
PC Controller for DDC-8000
PC Controller for DSM-1000
PC Controller for DM-LU2
Duplo GA - PC Controller
Other software External Feed Controller
DM JOB FILE TRANSFER
eTandem
Duplo + insight Connector

〈MEASURE〉
On the computer used for Duplo product, please follow the steps as mentioned below to make sure the update.
Select [Start menu] > [Settings] > [Update & Security] > [Windows Update].
Or, select [Start menu] > [Settings] > [Windows Update].
After that, if the screen indicates “Your device is up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Product information sheet File No. P3674".

Apr 26th, 2024(#2)

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet.
If you have already enabled Windows Update (‘Advanced options’ that is described in 〈Measures〉 is required.), it is not necessary to take any measures against this.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please refer to 〈Measures〉 in a later description to perform Windows Update.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
JDF Console DC-646 JDF Console

Please follow the links provided below for details on Vulnerabilities of Microsoft .NET Framework.

https://nvd.nist.gov/vuln/detail/CVE-2016-0149
https://nvd.nist.gov/vuln/detail/CVE-2016-3255
https://nvd.nist.gov/vuln/detail/CVE-2017-0160
https://nvd.nist.gov/vuln/detail/CVE-2017-0248
https://nvd.nist.gov/vuln/detail/CVE-2017-8759
https://nvd.nist.gov/vuln/detail/CVE-2018-0764
https://nvd.nist.gov/vuln/detail/CVE-2018-0765
https://nvd.nist.gov/vuln/detail/CVE-2018-0786
https://nvd.nist.gov/vuln/detail/CVE-2018-1039
https://nvd.nist.gov/vuln/detail/CVE-2018-8202
https://nvd.nist.gov/vuln/detail/CVE-2018-8284
https://nvd.nist.gov/vuln/detail/CVE-2018-8356
https://nvd.nist.gov/vuln/detail/CVE-2018-8360
https://nvd.nist.gov/vuln/detail/CVE-2018-8421
https://nvd.nist.gov/vuln/detail/CVE-2018-8517
https://nvd.nist.gov/vuln/detail/CVE-2018-8540
https://nvd.nist.gov/vuln/detail/CVE-2019-0545
https://nvd.nist.gov/vuln/detail/CVE-2019-0613
https://nvd.nist.gov/vuln/detail/CVE-2019-0657
https://nvd.nist.gov/vuln/detail/CVE-2019-0820
https://nvd.nist.gov/vuln/detail/CVE-2019-0864
https://nvd.nist.gov/vuln/detail/CVE-2019-0980
https://nvd.nist.gov/vuln/detail/CVE-2019-0981
https://nvd.nist.gov/vuln/detail/CVE-2019-1083
https://nvd.nist.gov/vuln/detail/CVE-2019-1113
https://nvd.nist.gov/vuln/detail/CVE-2019-1142
https://nvd.nist.gov/vuln/detail/CVE-2020-0605
https://nvd.nist.gov/vuln/detail/CVE-2020-0606
https://nvd.nist.gov/vuln/detail/CVE-2020-0646
https://nvd.nist.gov/vuln/detail/CVE-2020-1046
https://nvd.nist.gov/vuln/detail/CVE-2020-1066
https://nvd.nist.gov/vuln/detail/CVE-2020-1108
https://nvd.nist.gov/vuln/detail/CVE-2020-1147
https://nvd.nist.gov/vuln/detail/CVE-2020-1476
https://nvd.nist.gov/vuln/detail/CVE-2020-16937
https://nvd.nist.gov/vuln/detail/CVE-2021-24111
https://nvd.nist.gov/vuln/detail/CVE-2022-21911
https://nvd.nist.gov/vuln/detail/CVE-2022-26832
https://nvd.nist.gov/vuln/detail/CVE-2022-26929
https://nvd.nist.gov/vuln/detail/CVE-2022-30130
https://nvd.nist.gov/vuln/detail/CVE-2022-41064
https://nvd.nist.gov/vuln/detail/CVE-2022-41089
https://nvd.nist.gov/vuln/detail/CVE-2023-21722
https://nvd.nist.gov/vuln/detail/CVE-2023-21808
https://nvd.nist.gov/vuln/detail/CVE-2023-24895
https://nvd.nist.gov/vuln/detail/CVE-2023-24897
https://nvd.nist.gov/vuln/detail/CVE-2023-24936
https://nvd.nist.gov/vuln/detail/CVE-2023-29326
https://nvd.nist.gov/vuln/detail/CVE-2023-29331
https://nvd.nist.gov/vuln/detail/CVE-2023-32030
https://nvd.nist.gov/vuln/detail/CVE-2023-36049
https://nvd.nist.gov/vuln/detail/CVE-2023-36560
https://nvd.nist.gov/vuln/detail/CVE-2023-36788
https://nvd.nist.gov/vuln/detail/CVE-2023-36792
https://nvd.nist.gov/vuln/detail/CVE-2023-36793
https://nvd.nist.gov/vuln/detail/CVE-2023-36794
https://nvd.nist.gov/vuln/detail/CVE-2023-36796
https://nvd.nist.gov/vuln/detail/CVE-2023-36873
https://nvd.nist.gov/vuln/detail/CVE-2023-36899
https://nvd.nist.gov/vuln/detail/CVE-2024-0057
https://nvd.nist.gov/vuln/detail/CVE-2024-21312
DC-746 JDF Console

Please follow the links provided below for details on Vulnerabilities of Microsoft .NET Framework.

https://nvd.nist.gov/vuln/detail/CVE-2022-21911
https://nvd.nist.gov/vuln/detail/CVE-2022-26832
https://nvd.nist.gov/vuln/detail/CVE-2022-26929
https://nvd.nist.gov/vuln/detail/CVE-2022-30130
https://nvd.nist.gov/vuln/detail/CVE-2022-41064
https://nvd.nist.gov/vuln/detail/CVE-2022-41089
https://nvd.nist.gov/vuln/detail/CVE-2023-21722
https://nvd.nist.gov/vuln/detail/CVE-2023-21808
https://nvd.nist.gov/vuln/detail/CVE-2023-24895
https://nvd.nist.gov/vuln/detail/CVE-2023-24897
https://nvd.nist.gov/vuln/detail/CVE-2023-24936
https://nvd.nist.gov/vuln/detail/CVE-2023-29326
https://nvd.nist.gov/vuln/detail/CVE-2023-29331
https://nvd.nist.gov/vuln/detail/CVE-2023-32030
https://nvd.nist.gov/vuln/detail/CVE-2023-36049
https://nvd.nist.gov/vuln/detail/CVE-2023-36560
https://nvd.nist.gov/vuln/detail/CVE-2023-36788
https://nvd.nist.gov/vuln/detail/CVE-2023-36792
https://nvd.nist.gov/vuln/detail/CVE-2023-36793
https://nvd.nist.gov/vuln/detail/CVE-2023-36794
https://nvd.nist.gov/vuln/detail/CVE-2023-36796
https://nvd.nist.gov/vuln/detail/CVE-2023-36873
https://nvd.nist.gov/vuln/detail/CVE-2023-36899
https://nvd.nist.gov/vuln/detail/CVE-2024-0057
https://nvd.nist.gov/vuln/detail/CVE-2024-21312

Vulnerabilities of Microsoft SQL Server

Product Model name Reference for detail
JDF Console DC-646 JDF Console

Please follow the links provided below for details on Vulnerabilities of Microsoft SQL Server used in the JDF Console.

https://nvd.nist.gov/vuln/detail/CVE-2020-0618
https://nvd.nist.gov/vuln/detail/CVE-2021-1636
https://nvd.nist.gov/vuln/detail/CVE-2022-29143
https://nvd.nist.gov/vuln/detail/CVE-2023-21528
https://nvd.nist.gov/vuln/detail/CVE-2023-21718
https://nvd.nist.gov/vuln/detail/CVE-2023-21713
https://nvd.nist.gov/vuln/detail/CVE-2023-21705
https://nvd.nist.gov/vuln/detail/CVE-2023-21704
https://nvd.nist.gov/vuln/detail/CVE-2023-23384
https://nvd.nist.gov/vuln/detail/CVE-2023-36728
DC-746 JDF Console

Please follow the links provided below for details on Vulnerabilities of Microsoft SQL Server used in the JDF Console.

https://nvd.nist.gov/vuln/detail/CVE-2022-29143
https://nvd.nist.gov/vuln/detail/CVE-2023-21528
https://nvd.nist.gov/vuln/detail/CVE-2023-21718
https://nvd.nist.gov/vuln/detail/CVE-2023-21713
https://nvd.nist.gov/vuln/detail/CVE-2023-21705
https://nvd.nist.gov/vuln/detail/CVE-2023-21704
https://nvd.nist.gov/vuln/detail/CVE-2023-23384
https://nvd.nist.gov/vuln/detail/CVE-2023-36728

〈MEASURE〉
Through the computer connected to the Duplo product, Select [Start menu] > [settings] > [(Update & Security:for Windows10 only)] > [Windows Update].
To perform Windows Update, make settings for [Advanced options] in the procedure below.
●For Windows10: [Settings] > [Update & Security] > [Advanced options] > Select “On” for [Receive updates for other Microsoft products when you update Windows]
●For Windows11: [Settings] > [Windows Update] > [Advanced options] > Select “On” for [Receive updates for other Microsoft products].
After that, if the screen indicates “You’re up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Technical information sheet File No. 02565".

Dec 1st, 2023

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. However, you have already enabled Windows Update, it is not necessary to take any measures because Windows Update always keeps the security in the computer up to date.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please be informed about the detail and the products subject to in the table below.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
PC CONTOROLLER PC Controller for DIB-R https://nvd.nist.gov/vuln/detail/CVE-2023-36788
https://nvd.nist.gov/vuln/detail/CVE-2023-36792
https://nvd.nist.gov/vuln/detail/CVE-2023-36793
https://nvd.nist.gov/vuln/detail/CVE-2023-36794
https://nvd.nist.gov/vuln/detail/CVE-2023-36796
https://nvd.nist.gov/vuln/detail/CVE-2023-36873
https://nvd.nist.gov/vuln/detail/CVE-2023-36899
https://nvd.nist.gov/vuln/detail/CVE-2023-32030
https://nvd.nist.gov/vuln/detail/CVE-2023-29331
https://nvd.nist.gov/vuln/detail/CVE-2023-29326
https://nvd.nist.gov/vuln/detail/CVE-2023-24895
https://nvd.nist.gov/vuln/detail/CVE-2023-24897
https://nvd.nist.gov/vuln/detail/CVE-2023-24936
PC Controller for DMSF-10
PC Controller for DSF-2200
PC Controller for DSF-6000
PC Controller for DSC-10/60i
PC Controller for DDC-810
PC Controller for DDC-8000
PC Controller for DSM-1000
PC Controller for DM-LU2
Duplo GA - PC Controller
Other software External Feed Controller
DM JOB FILE TRANSFER
eTandem
Duplo + insight Connector

〈MEASURE〉
On the computer used for Duplo product, please follow the steps as mentioned below to make sure the update.
Select [Start menu] > [Settings] > [Update & Security] > [Windows Update].
Or, select [Start menu] > [Settings] > [Windows Update].
After that, if the screen indicates “Your device is up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Product information sheet File No. P3674".

Duplo Corporation

May 18th, 2023

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. However, you have already enabled Windows Update, it is not necessary to take any measures because Windows Update always keeps the security in the computer up to date.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please be informed about the detail and the products subject to in the table below.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
PC CONTOROLLER PC Controller for DIB-R https://nvd.nist.gov/vuln/detail/CVE-2023-21722
https://nvd.nist.gov/vuln/detail/CVE-2022-41089
https://nvd.nist.gov/vuln/detail/CVE-2022-41064
https://nvd.nist.gov/vuln/detail/CVE-2022-26929
PC Controller for DMSF-10
PC Controller for DSF-2200
PC Controller for DSF-6000
PC Controller for DSC-10/60i
PC Controller for DDC-810
PC Controller for DDC-8000
PC Controller for DSM-1000
PC Controller for DM-LU2
Duplo GA - PC Controller
Other software External Feed Controller
DM JOB FILE TRANSFER
eTandem
Duplo + insight Connector

〈MEASURE〉
On the computer used for Duplo product, please follow the steps as mentioned below to make sure the update.
Select [Start menu] > [Settings] > [Update & Security] > [Windows Update].
Or, select [Start menu] > [Settings] > [Windows Update].
After that, if the screen indicates “Your device is up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Product information sheet File No. P3674".

Duplo Corporation

February 10th 2023

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. The products model DDC-810, DDC-8000 and DSM-1000 are subject to this issue.

We already have taken the measures for those products to prevent the issue. Model DDC-810 and DDC-8000 have been applied the measures and scheduled to ship from next production.
Model DSM-1000 has been applied the measures since the first production.

For such products, those shipped out or under production already, our software team has decided it is not necessary to take any measures because of their assessment of the vulnerabilities.
If you have any questions or concerns, for example, a vulnerabilities of the product you ordered, please do not hesitate to contact our service personnel. We would appreciate it if you could see the table below and contact us with the model name you using and the product information sheet File No mentioned in the next column.

Please be informed about the detail and the products subject to in the table below.

Product Model name Product information sheet File No. Program No. Reference for detail
PC CONTROLLER DSM-1000 P3683 19A-86814 or less See (Table 1) DSM-1000.
DDC-8000 P3669 19F-86925 or less See (Table 2) DDC-8000.
DDC-810 P3669 16K-86534 or less See (Table 3) DDC-810.

(Table 1) DSM-1000

Description Reference for detail
Vulnerabilities of Ghostscript https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817

(Table 2) DDC-8000

Description Reference for detail
Vulnerabilities of Ghostscript https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
Vulnerabilities of OpenCV https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14493

(Table 3) DDC-810

Description Reference for detail
Vulnerabilities of Ghostscript https://jvndb.jvn.jp/en/contents/2019/JVNDB-2019-012236.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817
Vulnerabilities of OpenCV https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5064 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12863 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12862 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12599 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12598 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12602 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12601 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12600 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12604 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1517 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1516

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could see the table above and contact us with the model name you using and the product information sheet File No mentioned in the next column.

Duplo Corporation

December 14th 2022

Dear customers,

Thank you for using Duplo products.
Several cyber security vulnerabilities have been found in Duplo products only while the computer, used for the products, are connected to the Internet. However, you have already enabled Windows Update, it is not necessary to take any measures because Windows Update always keeps the security in the computer up to date.
If you have not enabled Windows Update yet, it is necessary to enable and run it.
Please be informed about the detail and the products subject to in the table below.

Vulnerabilities of Microsoft .NET Framework

Product Model name Reference for detail
PC CONTOROLLER PC Controller for DIB-R https://nvd.nist.gov/vuln/detail/CVE-2022-30130
https://www.cve.org/CVERecord?id=CVE-2022-26832
https://www.cve.org/CVERecord?id=CVE-2022-21911
PC Controller for DMSF-10
PC Controller for DSF-2200
PC Controller for DSF-6000
PC Controller for DSC-10/60i
PC Controller for DDC-810
PC Controller for DDC-8000
PC Controller for DSM-1000
PC Controller for DM-LU2
Duplo GA - PC Controller
Other software External Feed Controller
DM JOB FILE TRANSFER
eTandem
Duplo + insight Connector

〈MEASURE〉
On the computer used for Duplo product, please follow the steps as mentioned below to make sure the update.
Select [Start menu] > [Settings] > [Update & Security] > [Windows Update].
Or, select [Start menu] > [Settings] > [Windows Update].
After that, if the screen indicates “Your device is up to date”, the computer is up to date. If it does not indicate, please select [Check for updates] and follow the instructions on the screen to install the update program to the computer.

〈CONTACT〉
If you have any questions or concerns, please do not hesitate to contact our service personnel. We would appreciate it if you could contact us with the "Product information sheet File No. P3674".

Duplo Corporation