Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.0

Yokogawa Vnet/IP Interface Package Denial-of-Service and Code Execution

CVE-2025-1924
Summary

A security issue has been discovered in Yokogawa's Vnet/IP Interface Package, which could allow an attacker to send a malicious packet and disrupt communication or run unauthorized programs on affected devices. This affects specific versions of the package used with CENTUM VP systems. Update to a fixed version to prevent potential disruptions.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
yokogawa vnet\/ip_interface_package <= r1.08.00 –
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP commun...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1 8.2
nvd CVSS4.0 6.0
Vulnerability type
CWE-191
CWE-787 Out-of-bounds Write
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026