Yokogawa CENTUM VP versions R5.01.00, R6.01.00, and vR7.01.00 contain a hardcoded password vulnerability that could allow attackers to login as the PROG user and modify permissions. This matters to developers and tech professionals because it affects critical infrastructure sectors worldwide, necessitating immediate attention for security updates. Affected users should change the authentication mode to Windows Authentication Mode or apply patch software R7.01.10 for CENTUM VP R7.01.00.
Read the full article at CISA Advisories
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



