Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.0
Yokogawa Vnet/IP Interface Package Denial-of-Service and Code Execution
CVE-2025-1924
Summary
A security issue has been discovered in Yokogawa's Vnet/IP Interface Package, which could allow an attacker to send a malicious packet and disrupt communication or run unauthorized programs on affected devices. This affects specific versions of the package used with CENTUM VP systems. Update to a fixed version to prevent potential disruptions.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| yokogawa | vnet\/ip_interface_package | <= r1.08.00 | – |
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP commun...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1
8.2
nvd CVSS4.0
6.0
Vulnerability type
CWE-191
CWE-787
Out-of-bounds Write
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026