Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.0
Yokogawa Vnet/IP Interface Package Allows Malicious Packet Crashing
CVE-2025-48023
Summary
The Yokogawa Vnet/IP Interface Package in certain versions may crash if it receives specially designed packets. This could lead to downtime or require a restart of the affected system. If you're using versions R1.07.00 or earlier of the Vnet/IP Interface Package for CENTUM VP R6 or R7, update to a fixed version as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| yokogawa | vnet\/ip_interface_package | <= r1.08.00 | – |
Original title
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may b...
Original description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation.
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
nvd CVSS3.1
6.5
nvd CVSS4.0
6.0
Vulnerability type
CWE-617
Published: 13 Feb 2026 · Updated: 10 Mar 2026 · First seen: 6 Mar 2026