Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.0

Yokogawa Vnet/IP Interface Package Allows Malicious Packet Crashing

CVE-2025-48023
Summary

The Yokogawa Vnet/IP Interface Package in certain versions may crash if it receives specially designed packets. This could lead to downtime or require a restart of the affected system. If you're using versions R1.07.00 or earlier of the Vnet/IP Interface Package for CENTUM VP R6 or R7, update to a fixed version as soon as possible.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
yokogawa vnet\/ip_interface_package <= r1.08.00 –
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may b...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1 6.5
nvd CVSS4.0 6.0
Vulnerability type
CWE-617
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026