Yokogawa Wide Area Communication Router
Yokogawa Wide Area Communication Router (VI461) for AW810D running Vnet/IP firmware R12 or earlier contains a vulnerability (CWE-330, weak random number generation) that could cause the router's communication functions to stop. Successful exploitation results in denial of service to the router's WAC functions, potentially disrupting data relay between control centers and field equipment. The vendor has identified the issue and recommends updating to Vnet/IP firmware R13 or later, but firmware updates require engagement with Yokogawa service personnel and incur service charges.
- Network access to the WAC Router (VI461) for AW810D device
- High attack complexity required (not trivial exploitation)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/34092588-62f0-4029-b515-eaca610934a6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.