Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.0
Yokogawa Vnet/IP Interface Package: Malicious Packets Can Crash Software
CVE-2025-48022
Summary
A vulnerability in the Yokogawa Vnet/IP Interface Package can cause a critical software component to crash if it receives a specially designed packet. This affects certain versions of the package used in the CENTUM VP R6 and R7 systems. Update to a fixed version as soon as possible to prevent potential disruptions to your system.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| yokogawa | vnet\/ip_interface_package | <= r1.08.00 | – |
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may b...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1
6.5
nvd CVSS4.0
6.0
Vulnerability type
CWE-130
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026