Because the vulnerabilities affect a critical system component, organizations that use Vnet/IP within their distributed control systems should upgrade to Vnet/IP R1.08.00 as quickly as possible. To further reduce risk, isolate OT network segments to the maximum extent feasible and enable continuous security monitoring with dedicated tools and antivirus protection.
This is not the first time Positive Technologies has supported Yokogawa in strengthening product security. In 2023, Positive Technologies researcher Denis Alimov discovered vulnerability PT-2023-2121 (CVE-2023-26593, BDU: 2023-01858), which affected multiple generations of CENTUM systems, including CENTUM CS 1000, CENTUM CS 3000, and CENTUM VP R4 through R6. If exploited, the vulnerability could allow an attacker to manipulate the industrial process. Previously, in 2020, Natalya Pokidova and Ivan Kurnakov helped remediate vulnerabilities PT-2020-3923 (CVE-2020-5608, BDU: 2020-04316) and PT-2020-3924 (CVE-2020-5609, BDU: 2020-04317) in the CAMS for HIS component, which manages alarm messages and events in Yokogawa's distributed control system.
To detect exploitation attempts targeting industrial control systems, organizations can use PT Industrial Security Incident Manager (PT ISIM), an industrial cyber resilience platform that includes an antivirus module powered by proprietary technology from Positive Technologies. Advanced NTA/NDR systems, such as PT Network Attack Discovery (PT NAD), can also identify exploitation attempts.
For up-to-date security information, visit the dbugs portal, which aggregates vulnerability data and vendor recommendations for software and hardware from vendors around the world.