Yokogawa CENTUM and Exaopc
Yokogawa CENTUM distributed control system products and Exaopc software contain a privilege escalation vulnerability (CWE-284) that allows a local attacker to manipulate system or process alarm displays. Affected versions include CENTUM VP and variants (up to R6.03.10), CENTUM CS 1000/3000 (all versions), B/M9000 VP/CS (all versions), and Exaopc (up to R3.75.00). Exploitation requires local access with user-level privileges and high technical skill; no remote exploitation is possible. The vulnerability could allow an attacker to generate false alarms or block legitimate alarm displays, potentially interfering with safe plant operation monitoring.
- Local access to an engineering workstation or operator console running vulnerable CENTUM or Exaopc software
- User-level or higher privileges on the affected PC
- Knowledge of internal alarm system architecture and memory layouts
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bb41d24b-8c98-4d4c-8d62-b8c01cee1771Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.