Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.0
Yokogawa Vnet/IP Interface Package Can Crash with Malicious Packets
CVE-2025-48021
Summary
A flaw in the Vnet/IP software stack of certain Yokogawa products can cause them to crash if they receive specially designed network traffic. This could disrupt normal operation of these products. Affected users should update to the latest version of the Vnet/IP Interface Package.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| yokogawa | vnet\/ip_interface_package | <= r1.08.00 | – |
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may b...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1
6.5
nvd CVSS4.0
6.0
Vulnerability type
CWE-191
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026