Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48021: CWE-191 Integer Underflow (Wrap or Wraparound) in Yokogawa Electric Corporation Vnet/IP Interface Package

0
Medium
VulnerabilityCVE-2025-48021cvecve-2025-48021cwe-191
Published: Fri Feb 13 2026 (02/13/2026, 04:56:15 UTC)
Source: CVE Database V5
Vendor/Project: Yokogawa Electric Corporation
Product: Vnet/IP Interface Package

Description

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 09:09:47 UTC

Technical Analysis

CVE-2025-48021 is an integer underflow vulnerability classified under CWE-191 found in the Vnet/IP Interface Package developed by Yokogawa Electric Corporation. This package is used in the CENTUM VP R6 and R7 series (VP6C3300 and VP7C3300) industrial control systems. The vulnerability arises when the software processes maliciously crafted network packets that trigger an integer underflow condition, causing the Vnet/IP software stack process to terminate unexpectedly. This termination results in a denial of service (DoS) condition, disrupting communication within the industrial control network. The vulnerability has a CVSS 4.0 base score of 6.0, indicating medium severity, with an attack vector requiring adjacent network access and high attack complexity. No privileges or user interaction are required, and the vulnerability does not impact confidentiality, integrity, or availability beyond the DoS effect. No public exploits have been reported yet, and no patches are currently linked, emphasizing the need for vigilance. The vulnerability affects versions R1.07.00 and earlier of the Vnet/IP Interface Package, which is integral to Yokogawa's CENTUM VP distributed control systems widely used in critical infrastructure sectors such as manufacturing, energy, and utilities.

Potential Impact

The primary impact of CVE-2025-48021 is denial of service due to the termination of the Vnet/IP software stack process. This disruption can halt or degrade communication between control system components, potentially leading to operational interruptions in industrial environments. For organizations relying on Yokogawa's CENTUM VP systems, this could mean temporary loss of monitoring and control capabilities, which may affect process safety, production efficiency, and system reliability. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact in critical infrastructure contexts can have significant downstream effects, including safety risks and financial losses. Given the high attack complexity and requirement for adjacent network access, exploitation is less likely from remote attackers but remains a concern for insiders or attackers who gain network proximity. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as industrial control systems often have long lifecycles and slower patch adoption rates.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or updates addressing CVE-2025-48021 and apply them promptly once available. 2. Restrict network access to the Vnet/IP Interface Package to trusted and authenticated devices only, using network segmentation and firewall rules to limit exposure. 3. Implement strict network access controls and monitoring on the industrial control network to detect and block anomalous or malformed packets that could trigger the vulnerability. 4. Employ intrusion detection/prevention systems (IDS/IPS) tuned to recognize suspicious traffic patterns targeting the Vnet/IP protocol. 5. Conduct regular security assessments and penetration tests focused on industrial control system components to identify potential exposure. 6. Establish incident response procedures specific to industrial control system disruptions to minimize downtime and operational impact. 7. Educate network and security personnel about the vulnerability and the importance of maintaining strict network hygiene in industrial environments. 8. Consider deploying redundant communication paths or failover mechanisms within the control system architecture to maintain availability during potential disruptions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
YokogawaGroup
Date Reserved
2025-05-15T03:31:13.259Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698eb7d6c9e1ff5ad8edd0be

Added to database: 2/13/2026, 5:34:14 AM

Last enriched: 2/20/2026, 9:09:47 AM

Last updated: 4/5/2026, 2:34:11 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses