Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7741: CWE-259 Use of hard-coded password in Yokogawa Electric Corporation CENTUM VP

0
Low
VulnerabilityCVE-2025-7741cvecve-2025-7741cwe-259
Published: Mon Mar 30 2026 (03/30/2026, 00:01:11 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: CENTUM VP

Description

CVE-2025-7741 is a low-severity vulnerability in Yokogawa Electric Corporation's CENTUM VP system involving a hardcoded password for the PROG user account used in CENTUM Authentication Mode. Exploitation requires an attacker to already have access to the Human Interface Station (HIS) screen controls, and the default PROG user permissions are limited, reducing the risk of critical operations or configuration changes. The vulnerability affects multiple versions of CENTUM VP (R5. 01. 00 to R5. 04. 20, R6. 01. 00 to R6. 12.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 00:23:32 UTC

Technical Analysis

CVE-2025-7741 identifies a hardcoded password vulnerability in Yokogawa Electric Corporation's CENTUM VP, a distributed control system widely used in industrial environments. The vulnerability resides in the PROG user account, which has a hardcoded password embedded within the system for authentication in CENTUM Authentication Mode. This hardcoded credential can potentially be extracted by an attacker through unspecified methods. Exploitation requires that the attacker already have direct or remote access to the Human Interface Station (HIS) with the affected CENTUM VP versions installed and configured in CTM authentication mode. The PROG user account by default has S1 permission level, equivalent to OFFUSER, which restricts critical operational or configuration changes. Therefore, even if an attacker logs in as PROG, the ability to perform harmful actions is limited unless the permissions have been modified. The vulnerability spans multiple versions of CENTUM VP, including R5.01.00 through R5.04.20, R6.01.00 through R6.12.00, and R7.01.00. The CVSS 4.0 base score is 2.1, reflecting low severity due to the requirement of local access, high attack complexity, and limited privileges. No patches or known exploits have been reported yet. The vulnerability highlights the risk of embedded credentials in critical industrial control systems, which could be leveraged by insiders or attackers who have already breached perimeter defenses.

Potential Impact

The primary impact of this vulnerability is unauthorized access to the PROG user account within the CENTUM VP system. Given the default limited permissions of the PROG user, the risk of executing critical operations or making configuration changes is low under normal circumstances. However, if the PROG user's permissions have been escalated or modified, an attacker could potentially perform unauthorized operational commands or system configuration changes, leading to disruption or manipulation of industrial processes. Since exploitation requires prior access to the HIS interface, this vulnerability mainly increases risk in environments where perimeter defenses have already been compromised or insider threats exist. The presence of a hardcoded password also raises concerns about credential management and potential lateral movement within industrial networks. While no known exploits are reported, the vulnerability could facilitate persistence or privilege escalation in targeted attacks against industrial control systems, potentially impacting availability and integrity of critical infrastructure operations.

Mitigation Recommendations

Organizations using affected versions of CENTUM VP should first verify whether the system is configured in CTM authentication mode and assess the permissions assigned to the PROG user account. It is critical to ensure that the PROG user's permissions remain at the default S1 (OFFUSER) level to minimize risk. Network segmentation and strict access controls should be enforced to limit access to the HIS interface, preventing unauthorized local or remote access. Monitoring and logging of HIS access and authentication attempts should be enhanced to detect suspicious activities. Since no patches are currently available, consider implementing compensating controls such as disabling or renaming the PROG account if feasible, or restricting its use through system configuration. Conduct regular audits of user permissions and credentials within the CENTUM VP environment. Additionally, employ strong perimeter security measures, including multi-factor authentication and intrusion detection systems, to prevent attackers from gaining initial access to the HIS. Engage with Yokogawa Electric Corporation for updates on patches or official remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-07-17T06:32:40.148Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c9befee6bfc5ba1d524370

Added to database: 3/30/2026, 12:08:30 AM

Last enriched: 3/30/2026, 12:23:32 AM

Last updated: 3/30/2026, 3:27:57 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses