Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48019: CWE-617 Reachable Assertion in Yokogawa Electric Corporation Vnet/IP Interface Package

0
Medium
VulnerabilityCVE-2025-48019cvecve-2025-48019cwe-617
Published: Fri Feb 13 2026 (02/13/2026, 04:51:46 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: Vnet/IP Interface Package

Description

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 09:04:52 UTC

Technical Analysis

CVE-2025-48019 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the Vnet/IP Interface Package provided by Yokogawa Electric Corporation. The affected versions are R1.07.00 or earlier, specifically for CENTUM VP R6 (VP6C3300) and R7 (VP7C3300) platforms. The vulnerability arises when the Vnet/IP software stack receives specially crafted packets that trigger an assertion failure within the code, causing the process to terminate unexpectedly. This results in a denial-of-service (DoS) condition impacting the availability of the Vnet/IP communication interface. The CVSS 4.0 base score is 6.0 (medium severity), with the vector indicating the attack requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges or user interaction needed (PR:N, UI:N), and causes high impact on availability (VA:H) but no impact on confidentiality or integrity. The vulnerability does not have known exploits in the wild as of the publication date. The Vnet/IP Interface Package is a critical component in Yokogawa's CENTUM VP distributed control systems (DCS), widely used in industrial automation and critical infrastructure sectors. The reachable assertion vulnerability could be exploited by an attacker with network access to disrupt control system communications, potentially affecting process stability and safety. The lack of authentication requirements increases the risk if an attacker gains access to the adjacent network segment. No official patches or fixes are currently linked, emphasizing the need for defensive measures until remediation is available.

Potential Impact

The primary impact of CVE-2025-48019 is denial of service against the Vnet/IP communication interface in Yokogawa's CENTUM VP control systems. This can lead to disruption of industrial process control communications, potentially causing operational downtime, loss of process control visibility, and safety risks in critical infrastructure environments such as power plants, chemical manufacturing, and water treatment facilities. The vulnerability affects availability but does not directly compromise confidentiality or integrity. However, process disruption in industrial control systems can have cascading effects, including financial losses, regulatory non-compliance, and safety hazards. Since the attack requires adjacent network access, the threat is significant in environments where network segmentation is weak or where attackers have gained footholds inside operational technology (OT) networks. The absence of known exploits reduces immediate risk, but the medium severity and critical nature of affected systems warrant proactive mitigation. Organizations relying on Yokogawa CENTUM VP systems globally could face operational interruptions if this vulnerability is exploited.

Mitigation Recommendations

1. Apply patches or updates from Yokogawa Electric Corporation as soon as they become available to address CVE-2025-48019. Monitor vendor advisories closely. 2. Implement strict network segmentation to isolate Vnet/IP traffic and restrict access to trusted devices only, minimizing the attack surface. 3. Deploy network intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection for malformed Vnet/IP packets to detect and block exploitation attempts. 4. Use firewall rules to limit adjacent network access to the Vnet/IP interface, allowing only authorized management and control systems. 5. Conduct regular security assessments and penetration testing of OT networks to identify and remediate exposure to reachable assertion vulnerabilities. 6. Establish robust monitoring and alerting for unexpected process terminations or communication failures in the Vnet/IP stack to enable rapid incident response. 7. Train OT personnel on recognizing signs of DoS attacks and maintaining secure network configurations. 8. Maintain an up-to-date asset inventory of Yokogawa products and versions to prioritize remediation efforts effectively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-05-15T03:31:13.258Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698eb0ccc9e1ff5ad8e97a52

Added to database: 2/13/2026, 5:04:12 AM

Last enriched: 2/20/2026, 9:04:52 AM

Last updated: 4/5/2026, 2:34:01 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses