Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.0

Yokogawa Vnet/IP Interface Package: Malicious Packets Can Crash Software

CVE-2025-48022
Summary

A vulnerability in the Yokogawa Vnet/IP Interface Package can cause a critical software component to crash if it receives a specially designed packet. This affects certain versions of the package used in the CENTUM VP R6 and R7 systems. Update to a fixed version as soon as possible to prevent potential disruptions to your system.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
yokogawa vnet\/ip_interface_package <= r1.08.00 –
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may b...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1 6.5
nvd CVSS4.0 6.0
Vulnerability type
CWE-130
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026