CISA

Yokogawa CENTUM VP

From Cybersecurity and Infrastructure Security Agency ↗

Successful exploitation of this vulnerability could allow an attacker to login as the PROG user and modify permissions.

The following versions of Yokogawa CENTUM VP are affected:

CENTUM VP >=R5.01.00|

CENTUM VP >=R6.01.00|

CENTUM VP vR7.01.00 (CVE-2025-7741)

Vendor

Equipment

Yokogawa

Yokogawa CENTUM VP

Use of Hard-coded Password

Critical Infrastructure Sectors: Critical Manufacturing, Energy, Food and Agriculture

Countries/Areas Deployed: Worldwide

Company Headquarters Location: Japan

Affected products contain a hardcoded password for the user account (PROG) used for CENTUM Authentication Mode within the system. Under the following conditions, there is a risk that an attacker could log in as the PROG user. The default permission for the PROG users is S1 permission (equivalent to OFFUSER). Therefore, for properly permission-controlled targets of operation and monitoring, e...