CVE-2025-1924

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:yokogawa:vnet\/ip_interface_package:*:*:*:*:*:*:*:*
OR cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:-:*:*:*
cpe:2.3:a:yokogawa:centum_vp:r7.01.10:*:*:*:-:*:*:*

History

02 Mar 2026, 15:33

Type Values Removed Values Added
References () https://web-material3.yokogawa.com/1/39281/files/YSAR-26-0002-E.pdf - () https://web-material3.yokogawa.com/1/39281/files/YSAR-26-0002-E.pdf - Vendor Advisory
First Time Yokogawa centum Vp
Yokogawa
Yokogawa vnet\/ip Interface Package
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.2
Summary
  • (es) Se ha encontrado una vulnerabilidad en el paquete de interfaz Vnet/IP proporcionado por Yokogawa Electric Corporation. Si el producto afectado recibe paquetes maliciosos, un ataque DoS puede provocar que las funciones de comunicación Vnet/IP se detengan o que se ejecuten programas arbitrarios. Los productos y versiones afectados son los siguientes: Paquete de interfaz Vnet/IP (para CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 o anterior
CPE cpe:2.3:a:yokogawa:centum_vp:*:*:*:*:-:*:*:*
cpe:2.3:a:yokogawa:centum_vp:r7.01.10:*:*:*:-:*:*:*
cpe:2.3:a:yokogawa:vnet\/ip_interface_package:*:*:*:*:*:*:*:*

13 Feb 2026, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-13 05:16

Updated : 2026-03-02 15:33


NVD link : CVE-2025-1924

Mitre link : CVE-2025-1924

CVE.ORG link : CVE-2025-1924


JSON object : View

Products Affected

yokogawa

  • vnet\/ip_interface_package
  • centum_vp
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)

CWE-787

Out-of-bounds Write