Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1924: CWE-191 Integer Underflow (Wrap or Wraparound) in Yokogawa Electric Corporation Vnet/IP Interface Package

0
Medium
VulnerabilityCVE-2025-1924cvecve-2025-1924cwe-191cwe-787
Published: Fri Feb 13 2026 (02/13/2026, 04:46:05 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: Vnet/IP Interface Package

Description

CVE-2025-1924 is an integer underflow vulnerability in the Vnet/IP Interface Package by Yokogawa Electric Corporation affecting versions R1. 07. 00 and earlier. This flaw can be triggered by maliciously crafted packets, potentially causing denial of service (DoS) by stopping Vnet/IP communication functions or enabling arbitrary code execution. The vulnerability stems from improper handling of integer values leading to wraparound conditions (CWE-191) and is related to memory issues (CWE-787). It requires network access with high attack complexity and no privileges or user interaction, impacting confidentiality minimally but posing a high risk to availability and integrity. No known exploits are currently reported in the wild. Organizations using CENTUM VP R6 and R7 systems with the vulnerable package should prioritize patching once available and implement network-level protections. Countries with significant industrial automation sectors using Yokogawa products, such as Japan, the United States, Germany, South Korea, and others, face higher risk. The severity is assessed as medium based on the CVSS 4.

AI-Powered Analysis

AILast updated: 02/20/2026, 09:08:49 UTC

Technical Analysis

CVE-2025-1924 identifies a critical integer underflow vulnerability (CWE-191) combined with memory safety issues (CWE-787) in the Vnet/IP Interface Package developed by Yokogawa Electric Corporation, specifically affecting versions R1.07.00 and earlier used in CENTUM VP R6 and R7 control systems. The vulnerability arises when the affected software processes maliciously crafted network packets, causing an integer underflow that leads to wraparound conditions. This can disrupt normal packet handling logic, resulting in denial of service (DoS) by halting Vnet/IP communication functions or, more severely, enabling arbitrary code execution. The vulnerability is exploitable remotely over the network (Attack Vector: Adjacent), but requires high attack complexity, no privileges, and no user interaction, indicating that exploitation is non-trivial but feasible in targeted scenarios. The impact on confidentiality is minimal, but integrity and availability impacts are significant, as attackers can disrupt critical industrial communication or execute arbitrary programs, potentially compromising industrial control processes. The vulnerability affects industrial automation environments relying on Yokogawa's CENTUM VP distributed control systems, widely used in sectors such as manufacturing, energy, and utilities. No patches or exploits are currently publicly available, but the risk remains due to the critical nature of the affected systems. The CVSS 4.0 base score is 6.0 (medium severity), reflecting the balance of impact and exploitation difficulty. The vulnerability was publicly disclosed in February 2026, with no known active exploitation reported to date.

Potential Impact

The vulnerability poses a significant risk to organizations operating industrial control systems (ICS) using Yokogawa's CENTUM VP R6 and R7 platforms with the vulnerable Vnet/IP Interface Package. Successful exploitation can cause denial of service, disrupting critical communication channels in industrial environments, potentially halting production lines, energy distribution, or other vital processes. More critically, arbitrary code execution could allow attackers to manipulate control logic, leading to safety hazards, operational downtime, and financial losses. Given the specialized nature of the affected systems, impact is concentrated in industrial sectors such as manufacturing, energy, chemical processing, and utilities. Disruption or compromise of these systems can have cascading effects on supply chains and critical infrastructure. The medium severity rating reflects the balance between the difficulty of exploitation and the potential for serious operational impact. Organizations lacking timely patching or network segmentation are at higher risk, especially if their Vnet/IP interfaces are exposed or accessible from less trusted networks.

Mitigation Recommendations

1. Apply patches or updates from Yokogawa Electric Corporation as soon as they become available to address this vulnerability. 2. Implement strict network segmentation to isolate Vnet/IP communication interfaces from untrusted networks, limiting access to only essential and trusted hosts. 3. Deploy network intrusion detection and prevention systems (IDS/IPS) configured to monitor and block anomalous or malformed Vnet/IP packets that could exploit the integer underflow. 4. Use firewall rules to restrict traffic to the Vnet/IP interface ports, allowing only known and authorized management and control systems. 5. Conduct regular security audits and vulnerability assessments of industrial control systems to identify and remediate exposure to this and similar vulnerabilities. 6. Establish incident response plans tailored for ICS environments to quickly detect and respond to potential exploitation attempts. 7. Monitor vendor advisories and threat intelligence feeds for updates on exploit availability or new mitigation techniques. 8. Train ICS operators and security personnel on recognizing signs of network-based attacks targeting Vnet/IP communications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-03-04T06:24:10.217Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698eb0ccc9e1ff5ad8e97a4f

Added to database: 2/13/2026, 5:04:12 AM

Last enriched: 2/20/2026, 9:08:49 AM

Last updated: 2/21/2026, 12:16:04 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats