Successful exploitation of this vulnerability could allow an attacker to login as the PROG user and modify permissions.
The following versions of Yokogawa CENTUM VP are affected:
CENTUM VP >=R5.01.00|
CENTUM VP >=R6.01.00|
CENTUM VP vR7.01.00 (CVE-2025-7741)
Vendor
Equipment
Yokogawa
Yokogawa CENTUM VP
Use of Hard-coded Password
Critical Infrastructure Sectors: Critical Manufacturing, Energy, Food and Agriculture
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Japan
Affected products contain a hardcoded password for the user account (PROG) used for CENTUM Authentication Mode within the system. Under the following conditions, there is a risk that an attacker could log in as the PROG user. The default permission for the PROG users is S1 permission (equivalent to OFFUSER). Therefore, for properly permission-controlled targets of operation and monitoring, e...