Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.0

Yokogawa Vnet/IP Interface Package may crash on malicious packet reception

CVE-2025-48020
Summary

The Vnet/IP Interface Package, used in Yokogawa's CENTUM VP R6 and R7 systems, may crash if it receives a specially crafted packet. This could disrupt system operation. Update the Vnet/IP software to the latest version to prevent this issue.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
yokogawa vnet\/ip_interface_package <= r1.08.00 –
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may b...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1 6.5
nvd CVSS4.0 6.0
Vulnerability type
CWE-617
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026