AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Yokogawa
YO
Platform

Yokogawa

CENTUM VP DCS, ProSafe-RS safety system, Vnet/IP industrial ethernet, and STARDOM field controllers for process industries.

https://www.yokogawa.com →
57
Total CVEs
0
Resources
13
CRIT
26
HIGH
14
MED
2
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
57 entries
CVE-2025-66603CRITICAL

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts the OPTIONS method. An attacker could potentially use this information to carry out other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
9.8
CVE-2025-66602CRITICAL

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts access by IP address. When a worm that randomly searches for IP addresses intrudes into the network, it could potentially be attacked by the worm. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
9.8
CVE-2025-1863CRITICAL

Insecure default settings have been found in recorder products provided by Yokogawa Electric Corporation. The default setting of the authentication function is disabled on the affected products. Therefore, when connected to a network with default settings, anyone can access all functions related to settings and operations. As a result, an attacker can illegally manipulate and configure important data such as measured values and settings. This issue affects GX10 / GX20 / GP10 / GP20 Paperless Recorders: R5.04.01 or earlier; GM Data Acquisition System: R5.05.01 or earlier; DX1000 / DX2000 / DX1000N Paperless Recorders: R4.21 or earlier; FX1000 Paperless Recorders: R1.31 or earlier; μR10000 / μR20000 Chart Recorders: R1.51 or earlier; MW100 Data Acquisition Units: All versions; DX1000T / DX2000T Paperless Recorders: All versions; CX1000 / CX2000 Paperless Recorders: All versions.

Apr 18, 2025
9.8
CVE-2022-23402CRITICAL

The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00

Mar 11, 2022
9.8
CVE-2022-21194CRITICAL

The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial configuration: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
9.8
CVE-2015-5628CRITICAL

Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet.

Feb 5, 2020
9.8
CVE-2015-5627CRITICAL

Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet.

Feb 5, 2020
9.8
CVE-2015-5626CRITICAL

Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet.

Feb 5, 2020
9.8
CVE-2019-5909CRITICAL

License Manager Service of YOKOGAWA products (CENTUM VP (R5.01.00 - R6.06.00), CENTUM VP Entry Class (R5.01.00 - R6.06.00), ProSafe-RS (R3.01.00 - R4.04.00), PRM (R4.01.00 - R4.02.00), B/M9000 VP(R7.01.01 - R8.02.03)) allows remote attackers to bypass access restriction to send malicious files to the PC where License Manager Service runs via unspecified vectors.

Feb 13, 2019
9.8
CVE-2018-0651CRITICAL

Buffer overflow in the license management function of YOKOGAWA products (iDefine for ProSafe-RS R1.16.3 and earlier, STARDOM VDS R7.50 and earlier, STARDOM FCN/FCJ Simulator R4.20 and earlier, ASTPLANNER R15.01 and earlier, TriFellows V5.04 and earlier) allows remote attackers to stop the license management function or execute an arbitrary program via unspecified vectors.

Jan 9, 2019
9.8
CVE-2018-17900CRITICAL

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote access to controllers.

Oct 12, 2018
9.8
CVE-2018-10592CRITICAL

Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.

Jul 31, 2018
9.8
CVE-2025-66606CRITICAL

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious scripts. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
9.6
CVE-2014-0781HIGH

Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via crafted UDP packets.

Mar 14, 2014
9.3
CVE-2014-0783HIGH

Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.

Mar 14, 2014
9.0
CVE-2022-22729HIGH

CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.8
CVE-2022-21808HIGH

Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.8
CVE-2024-5650HIGH

DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account. The affected products and versions are as follows: CENTUM CS 3000 R3.08.10 to R3.09.50 CENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.

Jun 17, 2024
8.5
CVE-2014-3888HIGH

Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet.

Jul 10, 2014
8.3
CVE-2014-0782HIGH

Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.

May 16, 2014
8.3
CVE-2014-0784HIGH

Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.

Mar 14, 2014
8.3
CVE-2025-1924HIGH

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
8.2
CVE-2022-22151HIGH

CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.1
CVE-2022-22145HIGH

CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncontrolled resource consumption. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.1
CVE-2022-21177HIGH

There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, andfrom R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.1
CVE-2018-17896HIGH

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify information. This attack can be executed only during maintenance work.

Oct 12, 2018
8.1
CVE-2023-26593HIGH

CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later

Apr 11, 2023
7.8
CVE-2022-23401HIGH

The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
7.8
CVE-2022-22148HIGH

'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
7.8
CVE-2022-22141HIGH

'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
7.8
CVE-2019-6008HIGH

An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.

Dec 26, 2019
7.8
CVE-2025-66598HIGH

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
7.5
CVE-2025-66597HIGH

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports weak cryptographic algorithms, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
7.5
CVE-2025-66608HIGH

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. An attacker could send specially crafted requests to steal files from the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
7.5
CVE-2022-32284HIGH

Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YOKOGAWA Wide Area Communication Router (WAC Router) AW810D, which may allow a remote attacker to cause denial-of-service (DoS) condition by sending a specially crafted packet.

Jul 4, 2022
7.5
CVE-2018-16196HIGH

Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors.

Jan 9, 2019
7.5
CVE-2018-17898HIGH

Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The controller application fails to prevent memory exhaustion by unauthorized requests. This could allow an attacker to cause the controller to become unstable.

Oct 12, 2018
7.5
CVE-2014-5208HIGH

BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.

Dec 22, 2014
7.5
CVE-2016-4860HIGH

Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic Designer connections, which allows remote attackers to reconfigure the device or cause a denial of service via a (1) stop application program, (2) change value, or (3) modify application command.

Sep 19, 2016
7.3
CVE-2025-48023MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48022MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48021MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48020MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48019MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-66596MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate request headers. When an attacker inserts an invalid host header, users could be redirected to malicious sites. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
6.1
CVE-2025-66601MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not specify MIME types. When an attacker performs a content sniffing attack, malicious scripts could be executed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
6.1
CVE-2025-66595MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product is vulnerable to Cross-Site Request Forgery (CSRF). When a user accesses a link crafted by an attacker, the user’s account could be compromised. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.4
CVE-2025-66594MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66607MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. Users could be redirected to malicious sites by an attacker. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66605MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input fields on this webpage with the autocomplete attribute enabled, the input content could be saved in the browser the user is using. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66604MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version could be displayed on the web page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2023-5915MEDIUM

A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.

Dec 1, 2023
5.3
CVE-2018-17902MEDIUM

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions.

Oct 12, 2018
5.3
CVE-2014-7251LOW

XML external entity (XXE) vulnerability in the WebHMI server in Yokogawa Electric Corporation FAST/TOOLS before R9.05-SP2 allows local users to cause a denial of service (CPU or network traffic consumption) or read arbitrary files via unspecified vectors.

Dec 6, 2014
3.2
CVE-2020-16232LOW

In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.

Mar 18, 2022
2.8
CVE-2025-66600Awaiting Analysis

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product lacks HSTS (HTTP Strict Transport Security) configuration. When an attacker performs a Man in the middle (MITM) attack, communications with the web server could be sniffed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
0.0
CVE-2025-66599Awaiting Analysis

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
0.0
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2025-66603CRITICAL
9.8
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web s…Feb 9, 2026›
CVE-2025-66602CRITICAL
9.8
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web s…Feb 9, 2026›
CVE-2025-1863CRITICAL
9.8
Insecure default settings have been found in recorder products provided by Yokogawa Electric Corpora…Apr 18, 2025›
CVE-2022-23402CRITICAL
9.8
The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM…Mar 11, 2022›
CVE-2022-21194CRITICAL
9.8
The following Yokogawa Electric products do not change the passwords of the internal Windows account…Mar 11, 2022›
CVE-2015-5628CRITICAL
9.8
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50…Feb 5, 2020›
CVE-2015-5627CRITICAL
9.8
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50…Feb 5, 2020›
CVE-2015-5626CRITICAL
9.8
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50…Feb 5, 2020›
CVE-2019-5909CRITICAL
9.8
License Manager Service of YOKOGAWA products (CENTUM VP (R5.01.00 - R6.06.00), CENTUM VP Entry Class…Feb 13, 2019›
CVE-2018-0651CRITICAL
9.8
Buffer overflow in the license management function of YOKOGAWA products (iDefine for ProSafe-RS R1.1…Jan 9, 2019›
CVE-2018-17900CRITICAL
9.8
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web a…Oct 12, 2018›
CVE-2018-10592CRITICAL
9.8
Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU contr…Jul 31, 2018›
CVE-2025-66606CRITICAL
9.6
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2014-0781HIGH
9.3
Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows r…Mar 14, 2014›
CVE-2014-0783HIGH
9.0
Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows re…Mar 14, 2014›
CVE-2022-22729HIGH
8.8
CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate th…Mar 11, 2022›
CVE-2022-21808HIGH
8.8
Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Elect…Mar 11, 2022›
CVE-2024-5650HIGH
8.5
DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric C…Jun 17, 2024›
CVE-2014-3888HIGH
8.3
Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 a…Jul 10, 2014›
CVE-2014-0782HIGH
8.3
Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENT…May 16, 2014›
CVE-2014-0784HIGH
8.3
Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows r…Mar 14, 2014›
CVE-2025-1924HIGH
8.2
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2022-22151HIGH
8.1
CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neut…Mar 11, 2022›
CVE-2022-22145HIGH
8.1
CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncon…Mar 11, 2022›
CVE-2022-21177HIGH
8.1
There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokoga…Mar 11, 2022›
CVE-2018-17896HIGH
8.1
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affec…Oct 12, 2018›
CVE-2023-26593HIGH
7.8
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensi…Apr 11, 2023›
CVE-2022-23401HIGH
7.8
The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 version…Mar 11, 2022›
CVE-2022-22148HIGH
7.8
'Root Service' service implemented in the following Yokogawa Electric products creates some named pi…Mar 11, 2022›
CVE-2022-22141HIGH
7.8
'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products cre…Mar 11, 2022›
CVE-2019-6008HIGH
7.8
An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? …Dec 26, 2019›
CVE-2025-66598HIGH
7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66597HIGH
7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66608HIGH
7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2022-32284HIGH
7.5
Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YO…Jul 4, 2022›
CVE-2018-16196HIGH
7.5
Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 -…Jan 9, 2019›
CVE-2018-17898HIGH
7.5
Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The contro…Oct 12, 2018›
CVE-2014-5208HIGH
7.5
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM…Dec 22, 2014›
CVE-2016-4860HIGH
7.3
Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic De…Sep 19, 2016›
CVE-2025-48023MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48022MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48021MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48020MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48019MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-66596MEDIUM
6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66601MEDIUM
6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66595MEDIUM
5.4
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66594MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed me…Feb 9, 2026›
CVE-2025-66607MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The respo…Feb 9, 2026›
CVE-2025-66605MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since the…Feb 9, 2026›
CVE-2025-66604MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The libra…Feb 9, 2026›
CVE-2023-5915MEDIUM
5.3
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yoko…Dec 1, 2023›
CVE-2018-17902MEDIUM
5.3
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The appli…Oct 12, 2018›
CVE-2014-7251LOW
3.2
XML external entity (XXE) vulnerability in the WebHMI server in Yokogawa Electric Corporation FAST/T…Dec 6, 2014›
CVE-2020-16232LOW
2.8
In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciou…Mar 18, 2022›
CVE-2025-66600Awaiting Analysis
0.0
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66599Awaiting Analysis
0.0
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical …Feb 9, 2026›