AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Yokogawa
YO
Platform

Yokogawa

CENTUM VP DCS, ProSafe-RS safety system, Vnet/IP industrial ethernet, and STARDOM field controllers for process industries.

https://www.yokogawa.com →
57
Total CVEs
0
Resources
13
CRIT
26
HIGH
14
MED
2
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
14 / 57
CVE-2025-48023MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48022MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48021MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48020MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48019MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-66596MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate request headers. When an attacker inserts an invalid host header, users could be redirected to malicious sites. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
6.1
CVE-2025-66601MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not specify MIME types. When an attacker performs a content sniffing attack, malicious scripts could be executed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
6.1
CVE-2025-66595MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product is vulnerable to Cross-Site Request Forgery (CSRF). When a user accesses a link crafted by an attacker, the user’s account could be compromised. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.4
CVE-2025-66594MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66607MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. Users could be redirected to malicious sites by an attacker. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66605MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input fields on this webpage with the autocomplete attribute enabled, the input content could be saved in the browser the user is using. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66604MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version could be displayed on the web page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2023-5915MEDIUM

A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.

Dec 1, 2023
5.3
CVE-2018-17902MEDIUM

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions.

Oct 12, 2018
5.3
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2025-48023MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48022MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48021MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48020MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48019MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-66596MEDIUM
6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66601MEDIUM
6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66595MEDIUM
5.4
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66594MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed me…Feb 9, 2026›
CVE-2025-66607MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The respo…Feb 9, 2026›
CVE-2025-66605MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since the…Feb 9, 2026›
CVE-2025-66604MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The libra…Feb 9, 2026›
CVE-2023-5915MEDIUM
5.3
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yoko…Dec 1, 2023›
CVE-2018-17902MEDIUM
5.3
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The appli…Oct 12, 2018›