Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.0
Yokogawa Vnet/IP Interface Software Stopped by Malicious Packets
CVE-2025-48019
Summary
A security issue in Yokogawa's Vnet/IP Interface Package can allow an attacker to crash the software by sending specially crafted network packets. If this happens, the affected system may become unavailable. If you use the affected version of this package, update to the latest version (R1.07.01 or later) to ensure your system remains secure.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| yokogawa | vnet\/ip_interface_package | <= r1.08.00 | – |
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may b...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1
6.5
nvd CVSS4.0
6.0
Vulnerability type
CWE-617
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026