CVE-2025-48021
Denial of Service in Yokogawa Vnet/IP Interface Package
Publication date: 2026-02-13
Last updated on: 2026-03-02
Assigner: YokogawaGroup
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yokogawa | vnet/ip_interface_package | to r1.08.00 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-191 | The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
I don't know
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
Can you explain this vulnerability to me?
This vulnerability exists in the Vnet/IP Interface Package provided by Yokogawa Electric Corporation. When the affected product receives specially crafted malicious packets, the Vnet/IP software stack process may be terminated, causing a disruption in its normal operation.
How can this vulnerability impact me? :
The impact of this vulnerability is that the Vnet/IP software stack process can be terminated unexpectedly if malicious packets are received. This could lead to service disruption or denial of service in systems using the affected Vnet/IP Interface Package.