Yokogawa Security Vulnerabilities (CVEs)
Track 28 security vulnerabilities affecting Yokogawa products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
A vulnerability in Yokogawa's Vnet/IP Interface Package allows remote attackers to cause denial of service by sending maliciously crafted packets, whi...
Feb 13, 2026A vulnerability in Yokogawa's Vnet/IP Interface Package allows attackers to crash the Vnet/IP software stack by sending maliciously crafted packets. T...
Feb 13, 2026A vulnerability in Yokogawa's Vnet/IP Interface Package allows remote attackers to cause denial of service by sending maliciously crafted packets. Thi...
Feb 13, 2026A vulnerability in Yokogawa's Vnet/IP Interface Package allows remote attackers to cause denial of service by sending maliciously crafted packets, whi...
Feb 13, 2026A vulnerability in Yokogawa's Vnet/IP Interface Package allows remote attackers to cause denial of service by sending maliciously crafted packets, whi...
Feb 13, 2026A vulnerability in Yokogawa's Vnet/IP Interface Package allows attackers to cause denial of service or execute arbitrary code by sending maliciously c...
Feb 13, 2026Yokogawa FAST/TOOLS industrial control system software uses weak cryptographic algorithms, potentially allowing attackers to decrypt web server commun...
Feb 9, 2026This vulnerability in Yokogawa's FAST/TOOLS software allows attackers to potentially decrypt communications by exploiting support for outdated SSL/TLS...
Feb 9, 2026A Cross-Site Request Forgery (CSRF) vulnerability in Yokogawa's FAST/TOOLS industrial control system allows attackers to compromise user accounts when...
Feb 9, 2026A host header injection vulnerability in Yokogawa FAST/TOOLS allows attackers to redirect users to malicious websites by manipulating request headers....
Feb 9, 2026This vulnerability in Yokogawa's FAST/TOOLS software exposes detailed error messages that could reveal sensitive system information. Attackers could l...
Feb 9, 2026This vulnerability in Yokogawa FAST/TOOLS involves insecure response header settings that could allow attackers to redirect users to malicious website...
Feb 9, 2026A path traversal vulnerability in Yokogawa's FAST/TOOLS software allows attackers to bypass URL validation and access arbitrary files on the web serve...
Feb 9, 2026This vulnerability in Yokogawa's FAST/TOOLS industrial control system software exposes library version information on web pages, potentially enabling ...
Feb 9, 2026A vulnerability in Yokogawa's FAST/TOOLS software allows browser autocomplete to save sensitive input data from web interfaces. This affects industria...
Feb 9, 2026A URL encoding vulnerability in Yokogawa's FAST/TOOLS industrial control system allows attackers to manipulate web pages or execute malicious scripts....
Feb 9, 2026A content sniffing vulnerability in Yokogawa's FAST/TOOLS software allows attackers to execute malicious scripts by exploiting unspecified MIME types....
Feb 9, 2026This vulnerability in Yokogawa's FAST/TOOLS allows web servers to be accessed directly by IP address, making them susceptible to automated scanning an...
Feb 9, 2026The OPTIONS method vulnerability in Yokogawa FAST/TOOLS web servers exposes HTTP method information that could aid attackers in reconnaissance and sub...
Feb 9, 2026This vulnerability allows adjacent attackers to intercept cleartext credentials and configuration data transmitted by STARDOM FCN and FCJ industrial c...
Jun 28, 2022This vulnerability involves hard-coded credentials in STARDOM FCN and FCJ controllers, allowing attackers with administrative access to read/change co...
Jun 28, 2022CVE-2022-26034 is an improper authentication vulnerability in Yokogawa CENTUM VP and B/M9000 VP industrial control systems. Attackers can bypass authe...
Apr 15, 2022This path traversal vulnerability in Yokogawa's CAMS for HIS Log Server allows attackers to access arbitrary files on affected systems. It affects ind...
Mar 11, 2022This vulnerability affects Yokogawa Electric industrial control systems where default Windows account passwords remain unchanged from initial configur...
Mar 11, 2022This vulnerability in Yokogawa's Long-term Data Archive Package service creates named pipes with improper access control lists (ACLs), allowing unauth...
Mar 11, 2022This vulnerability in Yokogawa's 'Root Service' allows attackers to exploit improperly configured named pipe ACLs, potentially enabling privilege esca...
Mar 11, 2022CVE-2022-22729 is an authentication bypass vulnerability in Yokogawa's CAMS for HIS Server that allows attackers to send specially crafted packets to ...
Mar 11, 2022This vulnerability involves hard-coded credentials in Yokogawa Electric's CENTUM VP and Exaopc products, allowing attackers to gain unauthorized acces...
Mar 11, 2022Why Monitor Yokogawa Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 28+ known vulnerabilities affecting Yokogawa products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Yokogawa packages in under 60 seconds. No agents required - completely agentless scanning that works across Yokogawa deployments.
Free vulnerability database: Access detailed information about every Yokogawa CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Yokogawa CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions