[Control systems] Yokogawa security advisory

Number: AV20-299
Date: 12 August 2020

On 11 August 2020 ICS-CERT released an Advisory highlighting vulnerabilities affecting the following Yokogawa CENTUM products:

  • CENTUM (Including CENTUM CS 3000 Entry Class) CS 3000 - versions R3.08.10 to R3.09.50
  • CENTUM VP (Including CENTUM VP Entry Class) - versions R4.01.00 to R6.07.00
  • B/M9000CS - versions R5.04.01 to R5.05.01
  • B/M9000 VP - versions R6.01.01 to R8.03.01

Exploitation of these vulnerabilities could allow a remote actor to send modified packets, create and overwrite files or execute arbitrary commands.

The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary manufacturer updates when available.

https://us-cert.cisa.gov/ics/advisories/icsa-20-224-01


Note to Readers
The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada’s national authority on cyber security and we lead the government’s response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: