Yokogawa CENTUM and ProSafe-RS
Multiple vulnerabilities exist in Yokogawa CENTUM VP, ProSafe-RS, and B/M9000 VP distributed control and safety systems. The vulnerabilities include authentication bypass (CWE-287), OS command injection (CWE-78), null pointer dereference (CWE-476), and improper input validation (CWE-20). Successful exploitation could allow an attacker with network access to leak or tamper with process data, cause denial of service, or execute arbitrary code on the engineering workstation or server. B/M9000 VP is indirectly affected if CENTUM is installed on the same PC.
- Network access to the engineering workstation or engineering server running CENTUM VP, B/M9000 VP, or ProSafe-RS (typically port 10000 or similar)
- Vulnerable versions must be installed: CENTUM VP R6.01.10–R6.09.00 (with VP6E5000), R6.01.10–R6.07.10 (with VP6E5100); ProSafe-RS R4.01.00–R4.07.00 (with RS4E5000), R4.01.00–R4.05.00 (with RS4E5100); B/M9000 VP R6.01.01–R6.03.02 or R8.01.01–R8.03.01
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f2f3baa8-cdd6-4b91-a73f-cbff6f6779a3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.