Yokogawa STARDOM
Yokogawa STARDOM FCN/FCJ controllers (firmware R1.01 through R4.31) contain vulnerabilities related to unencrypted data transmission (CWE-319) and hardcoded credentials (CWE-798). These allow attackers to intercept configuration data and credentials, then modify device settings or firmware. No public exploits currently exist, and the attack requires high privileges, network access to the device, and manual user interaction, making exploitation complex. Yokogawa has not released a patch and recommends network-level mitigations instead.
- Network access to the STARDOM FCN/FCJ controller (same network segment or direct connection)
- High-level privileges on the device or engineering workstation
- Ability to capture or intercept network traffic (unencrypted channel vulnerability)
- Manual user interaction to complete the attack
Patching may require device reboot — plan for process interruption
/api/v1/advisories/27e8b589-4819-45d4-a5f3-cd5c0e2008c8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.