If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed.
The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yokogawa Electric Corporation
Yokogawa Electric Corporation vnet/ip Interface Package |
|
| Vendors & Products |
Yokogawa Electric Corporation
Yokogawa Electric Corporation vnet/ip Interface Package |
Fri, 13 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Feb 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier | |
| Weaknesses | CWE-191 CWE-787 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: YokogawaGroup
Published:
Updated: 2026-02-13T13:07:18.570Z
Reserved: 2025-03-04T06:24:10.217Z
Link: CVE-2025-1924
Updated: 2026-02-13T13:07:05.450Z
Status : Awaiting Analysis
Published: 2026-02-13T05:16:02.843
Modified: 2026-02-13T14:23:48.007
Link: CVE-2025-1924
No data.
OpenCVE Enrichment
Updated: 2026-02-13T21:28:49Z