Yokogawa STARDOM Controllers (Update A)
The Yokogawa STARDOM controller family contains multiple critical vulnerabilities: hardcoded credentials (CWE-798), insufficient credential protection (CWE-522), session fixation (CWE-384), and denial-of-service memory exhaustion (CWE-400). An attacker with network access can authenticate using hardcoded credentials and execute arbitrary code on affected controllers. The vulnerabilities affect FCN-100, FCN-500, FCN-RTU, and FCJ models running firmware versions R4.10 and prior (R4.02 and prior for some models). Successful exploitation could allow remote code execution, unauthorized access, or denial of service on control systems managing critical processes.
- Network access to the STARDOM controller (directly or via industrial network)
- Knowledge of hardcoded credentials (publicly documented or discoverable)
- Device running vulnerable firmware version (R4.10 or earlier for FCN-RTU/FCJ, R4.02 or earlier for FCN-100/FCN-500)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0ccf7b0d-7bcf-4e9d-87ee-6520827124fdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.