Impact
A hardcoded password is stored for the PROG user in CENTUM VP’s authentication system. This allows an attacker who obtains the password to log in as PROG, potentially giving limited access with default S1 (OFFUSER) permissions. If the PROG user’s permissions have been altered, the attacker could execute configuration changes. The weakness is a default credential (CWE‑259).
Affected Systems
Yokogawa Electric Corporation CENTUM VP products are affected, specifically versions R5.01.00 through R5.04.20, R6.01.00 through R6.12.00, and R7.01.00.
Risk and Exploitability
The CVSS score of 2.1 indicates low overall severity. Exploitation requires first obtaining the hardcoded password by an unspecified method and having existing access to the HIS screen controls in CTM authentication mode; therefore the vulnerability is exploitable only when an attacker already has local or remote access to the system. The vulnerability is not listed in the CISA KEV catalog and no EPSS score is available, suggesting limited publicly known exploit activity.
OpenCVE Enrichment