Yokogawa CENTUM VP R6, R7
Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package versions R1.07.00 and earlier contain vulnerabilities (CWE-787 out-of-bounds write, CWE-617 reachable assertion, CWE-191 integer underflow, CWE-130 improper null termination) that could allow an attacker with network access to the device to execute arbitrary code, cause a denial-of-service condition, or terminate the software stack process. Exploitation requires adjacent network access and high attack complexity. No public exploitation has been reported.
- Network access to the CENTUM VP device on the adjacent network segment (AV:A)
- High attack complexity packet construction capability
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a3a62f28-dce5-4c4f-8549-04bb219abff1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.