Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Yokogawa — Vulnerabilities & Security Advisories 13

Browse all 13 CVE security advisories affecting Yokogawa. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Yokogawa specializes in industrial automation and control systems, serving critical infrastructure sectors. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and default configurations. Security researchers have identified weaknesses in their human-machine interfaces and network communication protocols. While no major public security incidents have been widely reported, the accumulation of 13 CVEs indicates persistent security challenges in their legacy and current systems, particularly in environments where unpatched devices remain operational. Their products' role in industrial processes makes security vulnerabilities potentially impactful for operational technology environments.

Found 1 results / 13Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2020-16232 Yokogawa WideField3 Buffer Copy Without Checking Size of Input — WideField3CWE-120 2.8 Low2022-03-18

This page lists every published CVE security advisory associated with Yokogawa. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.